STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215243

CAT II (Medium)

Audit logs on the AIX system must be owned by root.

Rule ID

SV-215243r958434_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000162CCI-000163CCI-000164

Discussion

Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity. Satisfies: SRG-OS-000057-GPOS-00027, SRG-OS-000058-GPOS-00028, SRG-OS-000059-GPOS-00029

Check Content

Check the log files under the audit logging directory have correct ownership.

The default log file is /audit/trail.

The log file can be set by the "trail" variable in /etc/security/audit/config.
# grep trail /etc/security/audit/config
        trail = /audit/trail

# ls -l <auditlog dir>
total 240
-rw-rw----    1 root     system            0 Feb 23 08:44 bin1
-rw-rw----    1 root     system            0 Feb 23 08:44 bin2
-rw-r-----    1 root     system       116273 Feb 23 08:44 trail

If any file's ownership is not "root", this is a finding.

Fix Text

Set the owner of the audit log file to "root".
# chown root <auditlog file>