Rule ID
SV-45211r1_rule
Version
V1R12
CCIs
If a user can write to the audit logs, then audit trails can be modified or destroyed and system intrusion may not be detected.
Check the system audit log files for extended ACLs. Procedure: # grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs ls -l If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Remove the extended ACL from the system audit file(s). # setfacl --remove-all [audit file]