STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

System audit logs must be owned by root.

DISA Rule

SV-227716r603266_rule

Vulnerability Number

V-227716

Group Title

SRG-OS-000057

Rule Version

GEN002680

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Change the ownership of the audit log file(s).

Procedure:
# chown root <audit log file>

Check Contents

Perform the following to determine the location of audit logs and then check the ownership.
# more /etc/security/audit_control
# ls -lLa <audit log dir>
If any audit log file is not owned by root, this is a finding.

Vulnerability Number

V-227716

Documentable

False

Rule Version

GEN002680

Severity Override Guidance

Perform the following to determine the location of audit logs and then check the ownership.
# more /etc/security/audit_control
# ls -lLa <audit log dir>
If any audit log file is not owned by root, this is a finding.

Check Content Reference

M

Target Key

4061

Comments