STIGQter STIGQter: STIG Summary: Canonical Ubuntu 16.04 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020: Audit tools must have a mode of 0755 or less permissive.

DISA Rule

SV-90333r2_rule

Vulnerability Number

V-75653

Group Title

SRG-OS-000256-GPOS-00097

Rule Version

UBTU-16-020180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the audit tools to be protected from unauthorized access by setting the correct permissive mode using the following command:

# sudo chmod 0755 [audit_tool]

Replace "[audit_tool]" with the audit tool that does not have the correct permissive mode.

Check Contents

Verify the audit tools are protected from unauthorized access, deletion, or modification by checking the permissive mode.

Check the octal permission of each audit tool by running the following command:

#stat -c "%a %n" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules

755 /sbin/augenrules

If any of the audit tools has a mode more permissive than "0755", this is a finding.

Vulnerability Number

V-75653

Documentable

False

Rule Version

UBTU-16-020180

Severity Override Guidance

Verify the audit tools are protected from unauthorized access, deletion, or modification by checking the permissive mode.

Check the octal permission of each audit tool by running the following command:

#stat -c "%a %n" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/audispd /sbin/augenrules

755 /sbin/augenrules

If any of the audit tools has a mode more permissive than "0755", this is a finding.

Check Content Reference

M

Target Key

3075

Comments