STIGQter STIGQter: STIG Summary: SLES 12 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The SUSE operating system must protect audit rules from unauthorized modification.

DISA Rule

SV-217202r603262_rule

Vulnerability Number

V-217202

Group Title

SRG-OS-000057-GPOS-00027

Rule Version

SLES-12-020120

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system to protect audit rules from unauthorized modification.

Add or update the following rules in "/etc/permissions.local":

/var/log/audit root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640

Set the correct permissions with the following command:

# sudo chkstat --set /etc/permissions.local

Check Contents

Verify that the SUSE operating system protects audit rules from unauthorized modification.

Check that "permissions.local" file contains the correct permissions rules with the following command:

# grep -i audit /etc/permissions.local

/var/log/audit root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640

If the command does not return any output, this is a finding.

Check that all of the audit information files and folders have the correct permissions with the following command:

# sudo chkstat /etc/permissions.local

If the command returns any output, this is a finding.

Vulnerability Number

V-217202

Documentable

False

Rule Version

SLES-12-020120

Severity Override Guidance

Verify that the SUSE operating system protects audit rules from unauthorized modification.

Check that "permissions.local" file contains the correct permissions rules with the following command:

# grep -i audit /etc/permissions.local

/var/log/audit root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640

If the command does not return any output, this is a finding.

Check that all of the audit information files and folders have the correct permissions with the following command:

# sudo chkstat /etc/permissions.local

If the command returns any output, this is a finding.

Check Content Reference

M

Target Key

4033

Comments