Rule ID
SV-259007r960930_rule
STIG
VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation GuideVersion
V2R2
CCIs
CCI-000162, CCI-000163, CCI-000164
Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will take is the modification or deletion of log records to cover tracks and prolong discovery. The web server must protect the log data from unauthorized modification. Satisfies: SRG-APP-000118-AS-000078, SRG-APP-000119-AS-000079, SRG-APP-000120-AS-000080
At the command prompt, run the following command:
# find /var/log/vmware/eam/ -xdev ! -name install.log -type f -a '(' -perm -o+w -o -not -user eam -o -not -group eam ')' -exec ls -ld {} \;
If any files are returned, this is a finding.At the command prompt, run the following commands: # chmod o-w <file> # chown eam:eam <file> Note: Substitute <file> with the listed file.