VCPF-70-000007 - Performance Charts log files must only be modifiable by privileged users.

Information

Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log records to cover tracks and prolong discovery. The web server must protect the log data from unauthorized modification. Performance Charts restricts all modification of log files by default, but this configuration must be verified.

Satisfies: SRG-APP-000118-WSR-000068, SRG-APP-000119-WSR-000069, SRG-APP-000120-WSR-000070

Solution

At the command prompt, run the following commands:

# chmod o-w <file>
# chown perfcharts:users <file>

Note: Substitute <file> with the listed file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-000162, CCI|CCI-000163, CCI|CCI-000164, Rule-ID|SV-256617r888342_rule, STIG-ID|VCPF-70-000007, Vuln-ID|V-256617

Plugin: Unix

Control ID: 9c299ee7f7499fed911b67967e99777b6f0a67c96b4fb658b894ed5cd80db308