STIGQter STIGQter: STIG Summary: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.

DISA Rule

SV-219194r610963_rule

Vulnerability Number

V-219194

Group Title

SRG-OS-000206-GPOS-00084

Rule Version

UBTU-18-010127

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to have permissions of 0640 o for the /var/log/syslog file by running the following command:

# sudo chmod 0640 /var/log/syslog

Check Contents

Verify that the Ubuntu operating system configures the /var/log/syslog file with mode 0640 or less permissive.

Check the /var/log/syslog permissions by running the following command:

# stat -c "%n %a" /var/log/syslog

/var/log/syslog 640

If a value of "640" or less permissive is not returned, this is a finding.

Vulnerability Number

V-219194

Documentable

False

Rule Version

UBTU-18-010127

Severity Override Guidance

Verify that the Ubuntu operating system configures the /var/log/syslog file with mode 0640 or less permissive.

Check the /var/log/syslog permissions by running the following command:

# stat -c "%n %a" /var/log/syslog

/var/log/syslog 640

If a value of "640" or less permissive is not returned, this is a finding.

Check Content Reference

M

Target Key

4055

Comments