Rule ID
SV-256522r991557_rule
Version
V1R4
CCIs
CCI-001493
Protecting audit information includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operations on audit information.
At the command line, run the following command: # stat -c "%n is owned by %U and group owned by %G" /etc/audit/auditd.conf If "auditd.conf" is not owned by root and group owned by root, this is a finding.
At the command line, run the following command: # chown root:root /etc/audit/auditd.conf