GEN005420 - The /etc/syslog.conf file must be group-owned by root, bin, sys, or system.

Information

If the group owner of /etc/syslog.conf is not root, bin, or sys, unauthorized users could be permitted to view, edit, or delete important system messages handled by the syslog facility.

Solution

Procedure:

# chgrp root /etc/syslog.conf

Or

# chgrp root /etc/rsyslog.conf

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218592r603259_rule, STIG-ID|GEN005420, STIG-Legacy|SV-65303, STIG-Legacy|V-4394, Vuln-ID|V-218592

Plugin: Unix

Control ID: 1382792af663953213a8574b89876c284ee0582bad362d9c76747c468c3c29b5