STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide

V-258811

CAT II (Medium)

The Photon operating system must protect audit logs from unauthorized access.

Rule ID

SV-258811r933494_rule

STIG

VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000162, CCI-000163, CCI-000164

Discussion

Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity. Satisfies: SRG-OS-000057-GPOS-00027, SRG-OS-000058-GPOS-00028, SRG-OS-000059-GPOS-00029

Check Content

At the command line, run the following command to find the current auditd log location:

# grep -iw log_file /etc/audit/auditd.conf

Example result:

log_file = /var/log/audit/audit.log

At the command line, run the following command using the file found in the previous step to verify auditd logs are protected from authorized access:

# stat -c "%n %U:%G %a" /var/log/audit/audit.log

Example result:

/var/log/audit/audit.log root:root 600

If the audit log file does not have permissions set to "0600", this is a finding.
If the audit log file is not owned by root, this is a finding.
If the audit log file is not group owned by root, this is a finding.

Fix Text

At the command line, run the following commands:

#  chmod 0600 <audit log file>
#  chown root:root <audit log file>

Replace <audit log file> with the target log file.

Note: If "log_group" is configured in the auditd.conf file and set to something other than "root", the permissions changes will not be persistent.