Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updates related to the rule permissions_local_var_log_audit #12356

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions controls/stig_slmicro5.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1441,8 +1441,9 @@ controls:
levels:
- medium
title: SLEM 5 must protect audit rules from unauthorized modification.
rules: []
status: pending
rules:
- permissions_local_var_log_audit
status: automated

- id: SLEM-05-653055
levels:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ title: 'Verify that Local Logs of the audit Daemon are not World-Readable'

description: |-
Files containing sensitive informations should be protected by restrictive
permissions. Most of the time, there is no need that these files need to bei
permissions. Most of the time, there is no need that these files need to be
read by any non-root user.

Check that "permissions.local" file contains the correct permissions rules with the following command:
Expand All @@ -17,6 +17,14 @@ description: |-
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640</pre>

{{% if product in slmicro %}}
Check that all of the audit information files and folders have the correct permissions with the following command:
<pre>$ sudo chkstat /etc/permissions.local</pre>

If the command returns any output, this is a finding.
{{% endif %}}


rationale: |-
Without the capability to restrict which roles and individuals can select
which events are audited, unauthorized personnel may be able to prevent the
Expand All @@ -30,6 +38,7 @@ severity: medium
identifiers:
cce@sle12: CCE-83117-2
cce@sle15: CCE-85607-0
cce@slmicro5: CCE-93776-3

references:
disa: CCI-000164
Expand All @@ -39,6 +48,33 @@ references:
stigid@sle15: SLES-15-030600

ocil: |-
{{% if product in slmicro %}}

Check that "permissions.local" file contains the correct permissions rules with the following command:

<pre># grep -i audit /etc/permissions.local

/var/log/audit/ root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640</pre>

Check that all of the audit information files and folders have the correct permissions with the following command:
<pre>$ sudo chkstat /etc/permissions.local</pre>

If the command returns any output, this is a finding.

Add or modify the following lines in "/etc/permissions.local":
<pre>
/var/log/audit root:root 600
/var/log/audit/audit.log root:root 600
/etc/audit/audit.rules root:root 640
/etc/audit/rules.d/audit.rules root:root 640
</pre>

Set the correct permissions with the following command:
<pre>$sudo chkstat --set /etc/permissions.local </pre>
{{% else %}}
Check that <tt>permissions.local</tt> file contains the correct permissionsi
rules with the following command:

Expand All @@ -56,3 +92,4 @@ ocil: |-
entries:

<pre># sudo chkstat --set --system</pre>
{{% endif %}}
1 change: 0 additions & 1 deletion shared/references/cce-slmicro5-avail.txt
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ CCE-93764-9
CCE-93765-6
CCE-93766-4
CCE-93767-2
CCE-93776-3
CCE-93777-1
CCE-93783-9
CCE-93789-6
Expand Down
Loading