3.4 Control access to audit records - /etc/security/audit_control

Information

The audit system on macOS writes important operational and security information that can be both useful for an attacker and a place for an attacker to attempt to obfuscate unwanted changes that were recorded. As part of defense-in-depth the /etc/security/audit_control configuration and the files in /var/audit should be owned only by root with group wheel with read only rights and no other access allowed. macOS ACLs should not be used for these files.

Rationale:

Audit records should never be changed except by the system daemon posting events. Records may be viewed or extracts manipulated but the authoritative files should be protected from unauthorized changes.

Impact:

This control is only checking the default configuration to ensure that unwanted access to audit records is not available.

Solution

If the system has different access controls on the audit logs and the changes cannot be traced a new install may be prudent. Check for signs of file tampering as well as unapproved OS changes.

Additional Information:

From ls man page

-e Print the Access Control List (ACL) associated with the file, if

present, in long (-l) output.

More info:

https://www.techrepublic.com/blog/apple-in-the-enterprise/introduction-to-os-x-access-control-lists-acls

http://ahaack.net/technology/OS-X-Access-Control-Lists-ACL.html

See Also

https://workbench.cisecurity.org/files/3092