STIGhub
STIGs
RMF Controls
Compare
← SI-11 — Error Handling
CCI-001314
Definition
Reveal error messages only to organization-defined personnel or roles.
Parent Control
SI-11
Error Handling
System and Information Integrity
Linked STIG Checks (200)
V-237058
CAT II
The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
A10 Networks ADC ALG Security Technical Implementation Guide
V-255601
CAT II
The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
A10 Networks ADC NDM Security Technical Implementation Guide
V-279036
CAT II
The ColdFusion log information must be protected from any type of unauthorized read access by having file ownership set properly.
Adobe ColdFusion Security Technical Implementation Guide
V-279072
CAT II
The ColdFusion error messages must be restricted to only authorized users.
Adobe ColdFusion Security Technical Implementation Guide
V-76453
CAT I
Kona Site Defender must reveal error messages only to the ISSO, ISSM, and SCA.
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
V-274108
CAT II
Amazon Linux 2023 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
Amazon Linux 2023 Security Technical Implementation Guide
V-274109
CAT II
Amazon Linux 2023 audit log directory must be owned by root to prevent unauthorized read access.
Amazon Linux 2023 Security Technical Implementation Guide
V-274110
CAT II
Amazon Linux 2023 audit logs file must have mode "0600" or less permissive to prevent unauthorized access to the audit log.
Amazon Linux 2023 Security Technical Implementation Guide
V-274116
CAT II
Amazon Linux 2023 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
Amazon Linux 2023 Security Technical Implementation Guide
V-274117
CAT II
Amazon Linux 2023 must ensure the audit log directory be owned by root to prevent unauthorized read access.
Amazon Linux 2023 Security Technical Implementation Guide
V-274125
CAT II
Amazon Linux 2023 must ensure the /var/log directory have mode "0755" or less permissive.
Amazon Linux 2023 Security Technical Implementation Guide
V-274126
CAT II
Amazon Linux 2023 must ensure the /var/log directory be owned by root.
Amazon Linux 2023 Security Technical Implementation Guide
V-274127
CAT II
Amazon Linux 2023 must ensure the /var/log directory be group-owned by root.
Amazon Linux 2023 Security Technical Implementation Guide
V-274128
CAT II
Amazon Linux 2023 must ensure the /var/log/messages file have mode "0640" or less permissive.
Amazon Linux 2023 Security Technical Implementation Guide
V-274129
CAT II
Amazon Linux 2023 must ensure the /var/log/messages file be group-owned by root.
Amazon Linux 2023 Security Technical Implementation Guide
V-274130
CAT II
Amazon Linux 2023 must ensure the /var/log/messages file be owned by root.
Amazon Linux 2023 Security Technical Implementation Guide
V-268110
CAT II
NixOS audit daemon must generate logs that are group-owned by root.
Anduril NixOS Security Technical Implementation Guide
V-268111
CAT II
NixOS audit directory and logs must be owned by root to prevent unauthorized read access.
Anduril NixOS Security Technical Implementation Guide
V-268112
CAT II
NixOS audit directory and logs must be group-owned by root to prevent unauthorized read access.
Anduril NixOS Security Technical Implementation Guide
V-268114
CAT II
NixOS audit logs must have a mode of 0600 or less permissive.
Anduril NixOS Security Technical Implementation Guide
V-268115
CAT II
NixOS journald directory and logs must be owned by root to prevent unauthorized read access.
Anduril NixOS Security Technical Implementation Guide
V-268116
CAT II
NixOS journald directory and logs must be group-owned by systemd-journald to prevent unauthorized read access.
Anduril NixOS Security Technical Implementation Guide
V-222976
CAT III
Default error pages for manager application must be customized.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222977
CAT II
ErrorReportValve showReport must be set to false.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-252452
CAT II
The macOS system must be configured so that log files must not contain access control lists (ACLs).
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252531
CAT II
The macOS system must be configured with system log files owned by root and group-owned by wheel or admin.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252532
CAT II
The macOS system must be configured with system log files set to mode 640 or less permissive.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257158
CAT II
The macOS system must be configured so that log files do not contain access control lists (ACLs).
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257237
CAT II
The macOS system must be configured with system log files owned by root and group-owned by wheel or admin.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257238
CAT II
The macOS system must be configured with system log files set to mode 640 or less permissive.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-268494
CAT II
The macOS system must disable sending diagnostic and usage data to Apple.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268550
CAT II
The macOS system must configure Apple System Log (ASL) files owned by root and group to wheel.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268551
CAT II
The macOS system must configure Apple System Log (ASL) files to mode 640 or less permissive.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268552
CAT II
The macOS system must configure system log files owned by root and group to wheel.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268553
CAT II
The macOS system must configure system log files to mode 640 or less permissive.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277101
CAT II
The macOS system must disable sending diagnostic and usage data to Apple.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277158
CAT II
The macOS system must configure Apple System Log (ASL) files owned by root and group to wheel.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277159
CAT II
The macOS system must configure Apple System Log (ASL) files to mode 640 or less permissive.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277161
CAT II
The macOS system must configure system log files owned by root and group to wheel.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277162
CAT II
The macOS system must configure system log files to mode 640 or less permissive.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-205028
CAT II
The ALG must reveal error messages only to the ISSO, ISSM, and SCA.
Application Layer Gateway Security Requirements Guide
V-222611
CAT II
The application must reveal error messages only to the ISSO, ISSM, or SA.
Application Security and Development Security Technical Implementation Guide
V-204775
CAT II
The application server must restrict error messages only to authorized users.
Application Server Security Requirements Guide
V-237333
CAT II
The ArcGIS Server must reveal error messages only to the ISSO, ISSM, and SA.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-276014
CAT I
Ax-OS must off-load audit records onto a different system or media than the system being audited.
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
V-237411
CAT II
The CA API Gateway must reveal error messages only to the ISSO, ISSM, and SCA.
CA API Gateway ALG Security Technical Implementation Guide
V-251626
CAT II
IDMS must reveal security-related messages only to authorized users.
CA IDMS Security Technical Implementation Guide
V-251627
CAT II
Custom database code and associated application code must reveal detailed error messages only to the Information System Security Officer (ISSO), Information System Security manager (ISSM), Systems Administrator (SA), and Database Administrator (DBA).
CA IDMS Security Technical Implementation Guide
V-219189
CAT II
The Ubuntu operating system must configure the /var/log directory to be group-owned by syslog.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-219190
CAT II
The Ubuntu operating system must configure the /var/log directory to be owned by root.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-219191
CAT II
The Ubuntu operating system must configure the /var/log directory to have mode 0755 or less permissive.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-219192
CAT II
The Ubuntu operating system must configure the /var/log/syslog file to be group-owned by adm.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-219193
CAT II
The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-219194
CAT II
The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238338
CAT II
The Ubuntu operating system must configure the /var/log directory to be group-owned by syslog.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238339
CAT II
The Ubuntu operating system must configure the /var/log directory to be owned by root.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238340
CAT II
The Ubuntu operating system must configure the /var/log directory to have mode "0755" or less permissive.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238341
CAT II
The Ubuntu operating system must configure the /var/log/syslog file to be group-owned by adm.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238342
CAT II
The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238343
CAT II
The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260488
CAT II
Ubuntu 22.04 LTS must configure the "/var/log" directory to have mode "755" or less permissive.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260491
CAT II
Ubuntu 22.04 LTS must configure "/var/log/syslog" file with mode "640" or less permissive.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260501
CAT II
Ubuntu 22.04 LTS must configure the directories used by the system journal to be owned by "root".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260502
CAT II
Ubuntu 22.04 LTS must configure the directories used by the system journal to be group-owned by "systemd-journal".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260503
CAT II
Ubuntu 22.04 LTS must configure the files used by the system journal to be owned by "root".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260504
CAT II
Ubuntu 22.04 LTS must configure the files used by the system journal to be group-owned by "systemd-journal".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260505
CAT II
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is owned by "root".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260506
CAT II
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is group-owned by "root".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260508
CAT II
Ubuntu 22.04 LTS must configure the "/var/log" directory to be owned by "root".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260509
CAT II
Ubuntu 22.04 LTS must configure the "/var/log" directory to be group-owned by "syslog".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260510
CAT II
Ubuntu 22.04 LTS must configure "/var/log/syslog" file to be owned by "syslog".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260511
CAT II
Ubuntu 22.04 LTS must configure the "/var/log/syslog" file to be group-owned by "adm".
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270759
CAT II
Ubuntu 24.04 LTS must be configured so that the "journalctl" command is owned by "root".
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270760
CAT II
Ubuntu 24.04 LTS must be configured so that the "journalctl" command is group-owned by "root".
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270761
CAT II
Ubuntu 24.04 LTS must configure the directories used by the system journal to be group-owned by "systemd-journal".
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270762
CAT II
Ubuntu 24.04 LTS must configure the files used by the system journal to be group-owned by "systemd-journal".
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270763
CAT II
Ubuntu 24.04 LTS must configure the directories used by the system journal to be owned by "root".
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270764
CAT II
Ubuntu 24.04 LTS must configure the files used by the system journal to be owned by "root"
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270765
CAT II
Ubuntu 24.04 LTS must configure the /var/log directory to be group-owned by syslog.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270766
CAT II
Ubuntu 24.04 LTS must configure the /var/log directory to be owned by root.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270767
CAT II
Ubuntu 24.04 LTS must configure the /var/log directory to have mode "0755" or less permissive.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270768
CAT II
Ubuntu 24.04 LTS must configure the /var/log/syslog file to be group-owned by adm.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270769
CAT II
Ubuntu 24.04 LTS must configure /var/log/syslog file to be owned by syslog.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270770
CAT II
Ubuntu 24.04 LTS must configure /var/log/syslog file with mode "0640" or less permissive.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-269442
CAT II
AlmaLinux OS 9 must not show boot up messages.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269443
CAT II
AlmaLinux OS 9 /var/log directory must be group-owned by root.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269444
CAT II
AlmaLinux OS 9 /var/log/messages file must be group-owned by root.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269445
CAT II
AlmaLinux OS 9 /var/log/messages file must be owned by root.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269446
CAT II
AlmaLinux OS 9 /var/log/messages file must have mode 0640 or less permissive.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269447
CAT II
AlmaLinux OS 9 /var/log directory must be owned by root.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269448
CAT II
AlmaLinux OS 9 /var/log directory must have mode 0755 or less permissive.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233533
CAT II
PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
Crunchy Data PostgreSQL Security Technical Implementation Guide
V-261909
CAT II
PostgreSQL must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).
Crunchy Data Postgres 16 Security Technical Implementation Guide
V-255561
CAT II
The DBN-6300 must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
DBN-6300 NDM Security Technical Implementation Guide
V-206579
CAT II
The DBMS must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
Database Security Requirements Guide
V-235781
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235782
CAT II
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-224186
CAT II
The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
V-213612
CAT II
The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
V-259267
CAT II
The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
V-228993
CAT II
The application must be configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
F5 BIG-IP Device Management Security Technical Implementation Guide
V-278388
CAT II
NGINX must protect audit information from unauthorized access.
F5 NGINX Security Technical Implementation Guide
V-203664
CAT II
The operating system must reveal error messages only to authorized users.
General Purpose Operating System Security Requirements Guide
V-215266
CAT II
AIX log files must be owned by a system account.
IBM AIX 7.x Security Technical Implementation Guide
V-215267
CAT II
AIX log files must be owned by a system group.
IBM AIX 7.x Security Technical Implementation Guide
V-215323
CAT II
AIX log files must have mode 0640 or less permissive.
IBM AIX 7.x Security Technical Implementation Guide
V-215324
CAT II
AIX log files must not have extended ACLs, except as needed to support authorized software.
IBM AIX 7.x Security Technical Implementation Guide
V-213714
CAT II
DB2 must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
IBM DB2 V10.5 LUW Security Technical Implementation Guide
V-250330
CAT II
The WebSphere Liberty Server must be configured to encrypt log information.
IBM WebSphere Liberty Server Security Technical Implementation Guide
V-255820
CAT II
The WebSphere Application Server security auditing must be enabled.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255836
CAT II
The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-223455
CAT II
CA-ACF2 must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223554
CAT II
IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223686
CAT II
IBM RACF must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS RACF Security Technical Implementation Guide
V-223701
CAT II
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS RACF Security Technical Implementation Guide
V-223881
CAT II
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS TSS Security Technical Implementation Guide
V-223909
CAT II
CA-TSS must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS TSS Security Technical Implementation Guide
V-251035
CAT III
The Sentry must reveal error messages only to the ISSO, ISSM, and SCA.
Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide
V-251035
CAT III
The Sentry must reveal error messages only to the ISSO, ISSM, and SCA.
Ivanti Sentry 9.x ALG Security Technical Implementation Guide
V-213537
CAT II
Access to JBoss log files must be restricted to authorized users.
JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
V-66545
CAT II
The Juniper SRX Services Gateway must reveal log messages or management console alerts only to the ISSO, ISSM, and SA roles).
Juniper SRX SG NDM Security Technical Implementation Guide
V-229018
CAT II
The Juniper SRX Services Gateway must generate alerts to the management console and generate a log record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are deleted.
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
V-213778
CAT II
SQL Server must reveal detailed error messages only to the ISSO, ISSM (or their designees), SA and DBA.
MS SQL Server 2014 Database Security Technical Implementation Guide
V-213978
CAT II
SQL Server must reveal detailed error messages only to documented and approved individuals or roles.
MS SQL Server 2016 Instance Security Technical Implementation Guide
V-205525
CAT II
The Mainframe Product must reveal full-text detail error messages only to system programmers and/or security administrators.
Mainframe Product Security Requirements Guide
V-276306
CAT II
Azure SQL Managed Instance must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).
Microsoft Azure SQL Managed Instance Security Technical Implementation Guide
V-272886
CAT II
Roles for use with Microsoft Defender for Endpoint (MDE) must be configured within Entra ID.
Microsoft Defender for Endpoint Security Technical Implementation Guide
V-272887
CAT II
Microsoft Defender for Endpoint (MDE) must be configured for a least privilege model by implementing Unified Role-Based Access Control (RBAC).
Microsoft Defender for Endpoint Security Technical Implementation Guide
V-271334
CAT II
SQL Server must reveal detailed error messages only to documented and approved individuals or roles.
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
V-253309
CAT II
The system must be configured to audit Account Management - User Account Management failures.
Microsoft Windows 11 Security Technical Implementation Guide
V-254391
CAT I
Windows Server 2022 permissions on the Active Directory data files must only allow System and Administrators access.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278138
CAT I
Windows Server 2025 permissions on the Active Directory data files must only allow system administrators (SAs) access.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-221184
CAT II
MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
V-252169
CAT II
MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
V-265932
CAT II
MongoDB must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
V-279368
CAT II
MongoDB must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA) and database administrator (DBA).
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
V-254116
CAT II
Nutanix AOS must restrict error messages only to authorized users.
Nutanix AOS 5.20.x Application Security Technical Implementation Guide
V-254233
CAT II
Nutanix AOS must reveal error messages only to authorized users.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279451
CAT II
Nutanix AOS must restrict error messages only to authorized users.
Nutanix Acropolis Application Server Security Technical Implementation Guide
V-279576
CAT II
Nutanix OS must configure the audit log files to be owned by root.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-279629
CAT II
Nutanix OS must restrict the message log access permissions to reveal error messages only to authorized users.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-279630
CAT II
Nutanix OS must restrict the /var/log directory access permissions to reveal error messages only to authorized users.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-219786
CAT II
The DBMS must restrict error messages, so only authorized personnel may view them.
Oracle Database 11.2g Security Technical Implementation Guide
V-220302
CAT II
The DBMS must restrict error messages so only authorized personnel may view them.
Oracle Database 12c Security Technical Implementation Guide
V-270584
CAT II
Oracle Database must restrict error messages so only authorized personnel may view them.
Oracle Database 19c Security Technical Implementation Guide
V-221899
CAT II
The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.
Oracle Linux 7 Security Technical Implementation Guide
V-248554
CAT II
The OL 8 "/var/log/messages" file must have mode 0640 or less permissive.
Oracle Linux 8 Security Technical Implementation Guide
V-248555
CAT II
The OL 8 "/var/log/messages" file must be owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-248556
CAT II
The OL 8 "/var/log/messages" file must be group-owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-248557
CAT II
The OL 8 "/var/log" directory must have mode 0755 or less permissive.
Oracle Linux 8 Security Technical Implementation Guide
V-248558
CAT II
The OL 8 "/var/log" directory must be owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-248559
CAT II
The OL 8 "/var/log" directory must be group-owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-248706
CAT II
The OL 8 lastlog command must be owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-248707
CAT II
The OL 8 lastlog command must be group-owned by root.
Oracle Linux 8 Security Technical Implementation Guide
V-271583
CAT II
OL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
Oracle Linux 9 Security Technical Implementation Guide
V-271584
CAT II
OL 9 audit log directory must be owned by root to prevent unauthorized read access.
Oracle Linux 9 Security Technical Implementation Guide
V-271585
CAT II
OL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.
Oracle Linux 9 Security Technical Implementation Guide
V-271818
CAT II
OL 9 /var/log directory must be group-owned by root.
Oracle Linux 9 Security Technical Implementation Guide
V-271819
CAT II
OL 9 /var/log directory must be owned by root.
Oracle Linux 9 Security Technical Implementation Guide
V-271820
CAT II
OL 9 /var/log directory must have mode 0755 or less permissive.
Oracle Linux 9 Security Technical Implementation Guide
V-271821
CAT II
OL 9 /var/log/messages file must be group-owned by root.
Oracle Linux 9 Security Technical Implementation Guide
V-271822
CAT II
OL 9 /var/log/messages file must be owned by root.
Oracle Linux 9 Security Technical Implementation Guide
V-271823
CAT II
OL 9 /var/log/messages file must have mode 0640 or less permissive.
Oracle Linux 9 Security Technical Implementation Guide
V-235995
CAT II
Oracle WebLogic must restrict error messages so only authorized personnel may view them.
Oracle WebLogic Server 12c Security Technical Implementation Guide
V-228875
CAT II
The Palo Alto Networks security platform must block traceroutes and ICMP probes originating from untrusted networks (e.g., ISP and other non-DoD networks).
Palo Alto Networks ALG Security Technical Implementation Guide
V-228659
CAT II
Administrators in the role of Security Administrator, Cryptographic Administrator, or Audit Administrator must not also have the role of Audit Administrator.
Palo Alto Networks NDM Security Technical Implementation Guide
V-214070
CAT II
PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
PostgreSQL 9.x Security Technical Implementation Guide
V-281033
CAT II
RHEL 10 must be configured so that the "/var/log" directory is owned by "root".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281034
CAT II
RHEL 10 must be configured so that the "/var/log" directory is group-owned by "root".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281035
CAT II
RHEL 10 must be configured so that the "/var/log/"messages file is owned by root.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281036
CAT II
RHEL 10 must be configured so that the "/var/log/messages" file is group-owned by "root".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281050
CAT II
RHEL 10 must enforce group ownership of audit logs by "root" or by a restricted logging group to prevent unauthorized read access.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281051
CAT II
RHEL 10 must enforce "root" ownership of the audit log directory to prevent unauthorized read access.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281052
CAT II
RHEL 10 must enforce "root" ownership of audit logs to prevent unauthorized access.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281053
CAT II
RHEL 10 must enforce group ownership by "root" or a restricted logging group for audit log files to prevent unauthorized access.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281054
CAT II
RHEL 10 must set mode "0600" or less permissive for the audit logs file to prevent unauthorized access to the audit log.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281061
CAT II
RHEL 10 must enforce mode "0755" or less permissive for the "/var/log" directory.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281062
CAT II
RHEL 10 must enforce mode "0640" or less permissive for the "/var/log/messages" file.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-228564
CAT II
The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-230245
CAT II
The RHEL 8 /var/log/messages file must have mode 0640 or less permissive.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-230246
CAT II
The RHEL 8 /var/log/messages file must be owned by root.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-230247
CAT II
The RHEL 8 /var/log/messages file must be group-owned by root.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-230248
CAT II
The RHEL 8 /var/log directory must have mode 0755 or less permissive.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-230249
CAT II
The RHEL 8 /var/log directory must be owned by root.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-230250
CAT II
The RHEL 8 /var/log directory must be group-owned by root.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-257885
CAT II
RHEL 9 /var/log directory must have mode 0755 or less permissive.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257886
CAT II
RHEL 9 /var/log/messages file must have mode 0640 or less permissive.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257914
CAT II
RHEL 9 /var/log directory must be owned by root.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257915
CAT II
RHEL 9 /var/log directory must be group-owned by root.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257916
CAT II
RHEL 9 /var/log/messages file must be owned by root.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257917
CAT II
RHEL 9 /var/log/messages file must be group-owned by root.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258165
CAT II
RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258166
CAT II
RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258167
CAT II
RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-275582
CAT II
Ubuntu OS must configure the "/var/log" directory to have mode "755" or less permissive.
Riverbed NetIM OS Security Technical Implementation Guide
V-261308
CAT II
SLEM 5 must prevent unauthorized users from accessing system error messages.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217188
CAT II
The SUSE operating system must prevent unauthorized users from accessing system error messages.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-22315
CAT II
System log files must not have extended ACLs, except as needed to support authorized software.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-787
CAT II
System log files must have mode 0640 or less permissive.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-216439
CAT III
The operating system must reveal error messages only to authorized personnel.
Solaris 11 SPARC Security Technical Implementation Guide