OL6-00-000135 - All rsyslog-generated log files must have mode 0600 or less permissive.

Information

Log files can contain valuable information regarding system configuration. If the system log files are not protected, unauthorized users could change the logged data, eliminating their forensic value.

Solution

The file permissions for all log files written by rsyslog should be set to 600, or more restrictive. These log files are determined by the second part of each Rule line in '/etc/rsyslog.conf' and typically all appear in '/var/log'. For each log file [LOGFILE] referenced in '/etc/rsyslog.conf', run the following command to inspect the file's permissions:

$ ls -l [LOGFILE]

If the permissions are not 600 or more restrictive, run the following command to correct this:

# chmod 0600 [LOGFILE]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-11b., CAT|II, CCI|CCI-001314, Rule-ID|SV-208872r793657_rule, STIG-ID|OL6-00-000135, STIG-Legacy|SV-65219, STIG-Legacy|V-51013, Vuln-ID|V-208872

Plugin: Unix

Control ID: b35ba8a7e175f22c4d259461bd71ce193c0507d0659e20c2db4a466b131362f8