STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215248

CAT II (Medium)

AIX audit tools must be owned by root.

Rule ID

SV-215248r991557_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-001493CCI-001494CCI-001495

Discussion

Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information. Operating systems providing tools to interface with audit information will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators. Satisfies: SRG-OS-000256-GPOS-00097, SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099

Check Content

Check the following audit tools are owned by "root":

    /usr/sbin/audit
    /usr/sbin/auditbin
    /usr/sbin/auditcat
    /usr/sbin/auditconv
    /usr/sbin/auditmerge
    /usr/sbin/auditpr
    /usr/sbin/auditselect
    /usr/sbin/auditstream
    /usr/sbin/auditldap

# ls -l /usr/sbin/audit*|grep -v ldap
-r-sr-x---    1 root     audit         64926 Mar 30 2016  /usr/sbin/audit
-r-sr-x---    1 root     audit         41240 Mar 30 2016  /usr/sbin/auditbin
-r-sr-x---    1 root     audit         40700 Mar 30 2016  /usr/sbin/auditcat
-r-sr-x---    1 root     audit         13072 Mar 30 2016  /usr/sbin/auditconv
-r-sr-x---    1 root     audit         11328 Mar 30 2016  /usr/sbin/auditmerge
-r-sr-x---    1 root     audit         53466 Mar 30 2016  /usr/sbin/auditpr
-r-sr-x---    1 root     audit         33128 Mar 30 2016  /usr/sbin/auditselect
-r-sr-x---    1 root     audit         29952 Mar 30 2016  /usr/sbin/auditstream
-r-x------    1 root     security      12204 Mar 30 2016  /usr/sbin/auditldap

If any above file's ownership is not "root", this is a finding.

Fix Text

For each audit tool in: 
   /usr/sbin/audit
    /usr/sbin/auditbin
    /usr/sbin/auditcat
    /usr/sbin/auditconv
    /usr/sbin/auditmerge
    /usr/sbin/auditpr
    /usr/sbin/auditselect
    /usr/sbin/auditstream

Set the owner to "root". 
# chown root <audit tool>

For  /usr/sbin/auditldap

Set the owner to "root". 
# chown root  /usr/sbin/auditldap