STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.

DISA Rule

SV-238343r654204_rule

Vulnerability Number

V-238343

Group Title

SRG-OS-000206-GPOS-00084

Rule Version

UBTU-20-010422

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to have permissions of 0640 for the "/var/log/syslog" file by running the following command:

$ sudo chmod 0640 /var/log/syslog

Check Contents

Verify that the Ubuntu operating system configures the "/var/log/syslog" file with mode 0640 or less permissive by running the following command:

$ sudo stat -c "%n %a" /var/log/syslog

/var/log/syslog 640

If a value of "640" or less permissive is not returned, this is a finding.

Vulnerability Number

V-238343

Documentable

False

Rule Version

UBTU-20-010422

Severity Override Guidance

Verify that the Ubuntu operating system configures the "/var/log/syslog" file with mode 0640 or less permissive by running the following command:

$ sudo stat -c "%n %a" /var/log/syslog

/var/log/syslog 640

If a value of "640" or less permissive is not returned, this is a finding.

Check Content Reference

M

Target Key

5318

Comments