PHTN-30-000048 - The Photon operating system must protect audit tools from unauthorized modification and deletion.

Information

Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operations on audit information.

Satisfies: SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099

Solution

At the command line, run the following command for each file returned for user and group ownership:

# chown root:root <file>

At the command line, run the following command for each file returned for file permissions:

# chmod 750 <file>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-001494, CCI|CCI-001495, Rule-ID|SV-256523r887243_rule, STIG-ID|PHTN-30-000048, Vuln-ID|V-256523

Plugin: Unix

Control ID: d4a0ec52f5e492fd92abd541b160a6ab58a554c49f76898730c2778c32125ad0