VCEM-67-000007 - ESX Agent Manager log files must only be modifiable by privileged users.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log records to cover tracks and prolong discovery. The web server must protect the log data from unauthorized modification. ESX Agent Manager restricts all modification of log files by default but this configuration must be verified.

Satisfies: SRG-APP-000119-WSR-000069, SRG-APP-000120-WSR-000070

Solution

At the command prompt, execute the following commands:

# chmod o-w <file>
# chown eam:users <file>

Note: Substitute <file> with the listed file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000163, CCI|CCI-000164, Rule-ID|SV-239378r674628_rule, STIG-ID|VCEM-67-000007, Vuln-ID|V-239378

Plugin: Unix

Control ID: 4b6496e0eaa15d4495e944a53afe164aac57ae6c159d3341db2d70a666339a45