Details
Audit_user is a sensitive file that, if compromised, would allow a malicious user to select auditing parameters to ignore their sessions. This would allow malicious operations the auditing subsystem would not detect for that user. It could also result in long-term system compromise possibly leading to the compromise of other systems and networks.
Solution
Remove the extended ACL from the file.
# chmod A- /etc/security/audit_user
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Rule-ID|SV-227537r603266_rule
- STIG-ID|GEN000000-SOL00110
- STIG-Legacy|SV-27004
- STIG-Legacy|V-22599
- Vuln-ID|V-227537
Comments
Please sign in to leave a comment.