Details
Limiting the accessibility of these objects will protect the confidentiality, integrity, and availability of the MySQL database and the communication with the client. If the contents of the SSL key file is known to an attacker he or she might impersonate the server. This can be used for a man-in-the-midddle attack. Depending on the SSL ciphersuite the key might also be used to decipher previously captured network traffic.
Solution
Execute the following commands at a terminal prompt to remediate these settings using the Value from the audit procedure: chown mysql:mysql
Supportive Information
The following resource is also helpful.
This control applies to the following type of system Unix.