VCST-70-000007 - Security Token Service log files must only be modifiable by privileged users.

Information

Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log records to cover tracks and prolong discovery.

The web server must protect the log data from unauthorized modification. Security Token Service restricts all modification of log files by default, but this configuration must be verified.

Satisfies: SRG-APP-000119-WSR-000069, SRG-APP-000120-WSR-000070

Solution

At the command prompt, run the following commands:

# chmod o-w <file>
# chown root:root <file>

Note: Substitute <file> with the listed file.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-000163, CCI|CCI-000164, Rule-ID|SV-256751r889223_rule, STIG-ID|VCST-70-000007, Vuln-ID|V-256751

Plugin: Unix

Control ID: 037cb929a86d49019b1356fd34204bb19a6328e9fd649143ffaba56a6a8c8d6e