1. Home
  2. Security Hardening
  3. CIS MySQL 5.6Windows OS L1 V1.1.0
  4. Ensure ‘relay_log_basename’ Files Have Appropriate Permissions

Ensure ‘relay_log_basename’ Files Have Appropriate Permissions

Details

MySQL can operate using a variety of log files, each used for different purposes. These are the binary log, error log, slow query log, relay log, and general log. Because these are files on the host operating system, they are subject to the permissions structure provided by the host and may be accessible by users other than the MySQL user.

Solution

Execute the following command for each log file location requiring corrected permissions:
chmod 660
chown mysql:mysql

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability, Configuration Management.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles