Details
Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log records to cover tracks and prolong discovery. The web server must protect the log data from unauthorized modification. Security Token Service restricts all modification of log files by default, but this configuration must be verified.
Satisfies: SRG-APP-000119-WSR-000069, SRG-APP-000120-WSR-000070
Solution
At the command prompt, execute the following commands:
# chmod o-w
# chown root:root
Note: Substitute
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-9
- CAT|II
- CCI|CCI-000163
- CCI|CCI-000164
- Rule-ID|SV-239658r679046_rule
- STIG-ID|VCST-67-000007
- Vuln-ID|V-239658