Information
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve.
To ensure the veracity of audit data, the operating system must protect audit information from unauthorized access.
Satisfies: SRG-OS-000057, SRG-OS-000058, SRG-OS-000059
Solution
Note: By default in Solaris 11.1, /var/audit is a link to /var/share/audit which is mounted on rpool/VARSHARE.
The root role is required.
This action applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this action applies.
Determine the location of the audit trail files
# pfexec auditconfig -getplugin audit_binfile|
The output will appear in this form:
Plugin: audit_binfile (active)
Attributes: p_dir=/var/audit;p_fsize=0;p_minfree=1
The p_dir attribute defines the location of the audit directory.
# chown root [directory]
# chgrp root [directory]
# chmod 750 [directory]