STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 Photon OS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The Photon operating system audit log must be group-owned by root.

DISA Rule

SV-239089r675075_rule

Vulnerability Number

V-239089

Group Title

SRG-OS-000059-GPOS-00029

Rule Version

PHTN-67-000017

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command line, execute the following command:

# chown root:root <audit log file>

Replace <audit log file> with the log files not group owned by root.

Check Contents

At the command line, execute the following command:

# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n is group owned by %G" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)

If any audit log file is not group-owned by root, this is a finding.

Vulnerability Number

V-239089

Documentable

False

Rule Version

PHTN-67-000017

Severity Override Guidance

At the command line, execute the following command:

# (audit_log_file=$(grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//) && if [ -f "${audit_log_file}" ] ; then printf "Log(s) found in "${audit_log_file%/*}":\n"; stat -c "%n is group owned by %G" ${audit_log_file%}*; else printf "audit log file(s) not found\n"; fi)

If any audit log file is not group-owned by root, this is a finding.

Check Content Reference

M

Target Key

5323

Comments