STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Oracle Linux 8 Security Technical Implementation Guide

V-248807

CAT II (Medium)

OL 8 audit tools must have a mode of "0755" or less permissive.

Rule ID

SV-248807r991557_rule

STIG

Oracle Linux 8 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-001493

Discussion

Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. OL 8 systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools, and the corresponding user rights, to make access decisions regarding the access to audit tools. Audit tools include but are not limited to vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.

Check Content

Verify the audit tools are protected from unauthorized access, deletion, or modification by checking the permissive mode. 
 
Check the octal permission of each audit tool by running the following command: 
 
$ sudo stat -c "%a %n" /sbin/auditctl /sbin/aureport /sbin/ausearch /sbin/autrace /sbin/auditd /sbin/rsyslogd /sbin/augenrules 
 
755 /sbin/auditctl 
755 /sbin/aureport 
755 /sbin/ausearch 
750 /sbin/autrace 
755 /sbin/auditd 
755 /sbin/rsyslogd 
755 /sbin/augenrules 
 
If any of the audit tools has a mode more permissive than "0755", this is a finding.

Fix Text

Configure the audit tools to be protected from unauthorized access by setting the correct permissive mode using the following command: 
 
$ sudo chmod 0755 [audit_tool] 
 
Replace "[audit_tool]" with the audit tool that does not have the correct permissive mode.