Details
The Solaris audit_user file allows for selective auditing or non-auditing of features for certain users. If it is not protected, it could be compromised and used to mask audit events. This could cause the loss of valuable forensics data in the case of a system compromise.
Solution
Change the group owner of the audit_user file to root, bin, or sys.
Example:
# chgrp root /etc/security/audit_user
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- CSCv6|3.1
- Rule-ID|SV-227535r603266_rule
- STIG-ID|GEN000000-SOL00080
- STIG-Legacy|SV-4351
- STIG-Legacy|V-4351
- Vuln-ID|V-227535
Comments
Please sign in to leave a comment.