RHEL-10-400175 - RHEL 10 must enforce "root" ownership of audit logs to prevent unauthorized access.

Information

Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality.

Satisfies: SRG-OS-000057-GPOS-00027, SRG-OS-000058-GPOS-00028, SRG-OS-000059-GPOS-00029, SRG-OS-000206-GPOS-00084

Solution

Configure RHEL 10 to enforce "root" ownership of audit logs to prevent unauthorized access with the following command:

$ sudo chown root [audit_log_file]

Replace "[audit_log_file]" with the correct audit log path. By default this location is "/var/log/audit/audit.log".

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-9, 800-53|SI-11b., CAT|II, CCI|CCI-000162, CCI|CCI-000163, CCI|CCI-000164, CCI|CCI-001314, Rule-ID|SV-281052r1165511_rule, STIG-ID|RHEL-10-400175, Vuln-ID|V-281052

Plugin: Unix

Control ID: b6838a4fff7a1cb94bc853a0cf285aaddb1bca1bd5a171f2e0324b274f92931a