STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.

DISA Rule

SV-238248r653919_rule

Vulnerability Number

V-238248

Group Title

SRG-OS-000059-GPOS-00029

Rule Version

UBTU-20-010128

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the audit log directory to have a mode of "0750" or less permissive.

Determine where the audit logs are stored with the following command:

$ sudo grep -iw ^log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log

Using the path of the directory containing the audit logs, configure the audit log directory to have a mode of "0750" or less permissive by
using the following command:

$ sudo chmod -R g-w,o-rwx /var/log/audit

Check Contents

Verify that the audit log directory has a mode of "0750" or less permissive.

Determine where the audit logs are stored with the following command:

$ sudo grep -iw ^log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log

Using the path of the directory containing the audit logs, determine if the directory has a mode of "0750" or less by using the following command:

$ sudo stat -c "%n %a" /var/log/audit /var/log/audit/*
/var/log/audit 750
/var/log/audit/audit.log 600

If the audit log directory has a mode more permissive than "0750", this is a finding.

Vulnerability Number

V-238248

Documentable

False

Rule Version

UBTU-20-010128

Severity Override Guidance

Verify that the audit log directory has a mode of "0750" or less permissive.

Determine where the audit logs are stored with the following command:

$ sudo grep -iw ^log_file /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log

Using the path of the directory containing the audit logs, determine if the directory has a mode of "0750" or less by using the following command:

$ sudo stat -c "%n %a" /var/log/audit /var/log/audit/*
/var/log/audit 750
/var/log/audit/audit.log 600

If the audit log directory has a mode more permissive than "0750", this is a finding.

Check Content Reference

M

Target Key

5318

Comments