System Audit Logs Must Be Owned By Root
Ensure Log Files Are Owned By Appropriate Group
Ensure Log Files Are Owned By Appropriate User
Ensure System Log Files Have Correct Permissions
System Audit Logs Must Have Mode 0640 or Less Permissive
Verify Group Who Owns /var/log Directory
Verify Group Who Owns /var/log/messages File
Verify Group Who Owns /var/log/syslog File
Verify User Who Owns /var/log Directory
Verify User Who Owns /var/log/messages File
Verify User Who Owns /var/log/syslog File
Verify Permissions on /var/log Directory
Verify Permissions on /var/log/messages File
Verify Permissions on /var/log/syslog File
Restrict Access to Kernel Message Buffer
System Audit Directories Must Be Group Owned By Root
System Audit Directories Must Be Owned By Root
System Audit Logs Must Be Group Owned By Root
Kubernetes Audit Logs Must Be Owned By Root
OAuth Audit Logs Must Be Owned By Root
OpenShift Audit Logs Must Be Owned By Root
Verify Group Who Owns lastlog Command
Verify Owner on lastlog Command
Verify Permissions on lastlog Command
Verify that local /var/log/messages is not world-readable
The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
Kona Site Defender must reveal error messages only to the ISSO, ISSM, and SCA.
The Arista Multilayer Switch must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
The ALG must reveal error messages only to the ISSO, ISSM, and SCA.
The application server must restrict error messages only to authorized users.
The application must reveal error messages only to the ISSO, ISSM, or SA.
The CA API Gateway must reveal error messages only to the ISSO, ISSM, and SCA.
IDMS must reveal security-related messages only to authorized users.
Custom database code and associated application code must reveal detailed error messages only to the Information System Security Officer (ISSO), Information System Security manager (ISSM), Systems Administrator (SA), and Database Administrator (DBA).
The DBN-6300 must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
The WebSphere Liberty Server must be configured to encrypt log information.
DB2 must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
The WebSphere Application Server security auditing must be enabled.
The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.
Access to JBoss log files must be restricted to authorized users.
The Sentry must reveal error messages only to the ISSO, ISSM, and SCA.
The Juniper SRX Services Gateway must generate alerts to the management console and generate a log record that can be forwarded to the ISSO and designated system administrators when the local accounts (i.e., the account of last resort or root account) are deleted.
The Mainframe Product must reveal full-text detail error messages only to system programmers and/or security administrators.
SQL Server must reveal detailed error messages only to the ISSO, ISSM (or their designees), SA and DBA.
Nutanix AOS must restrict error messages only to authorized users.
Nutanix AOS must reveal error messages only to authorized users.
Oracle WebLogic must restrict error messages so only authorized personnel may view them.
The application must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
The Tanium application must reveal error messages only to the information system security officer (ISSO), information system security manager (ISSM), and system administrator (SA).
The Tanium application must reveal error messages only to the ISSO, ISSM, and SA.
The UEM server must reveal error messages only to the Information System Security Manager (ISSM) and Information System Security Officer (ISSO).
The Horizon Connection Server must protect log files from unauthorized access.
Default error pages for manager application must be customized.
ErrorReportValve showReport must be set to false.
The macOS system must be configured so that log files must not contain access control lists (ACLs).
The macOS system must be configured so that log files do not contain access control lists (ACLs).
The macOS system must be configured with system log files owned by root and group-owned by wheel or admin.
The macOS system must be configured with system log files set to mode 640 or less permissive.
The macOS system must disable sending diagnostic and usage data to Apple.
The macOS system must configure Apple System Log files to be owned by root and group to wheel.
The macOS system must configure Apple System Log files to mode 640 or less permissive.
The macOS system must configure system log files to be owned by root and group to wheel.
The macOS system must configure system log files to mode 640 or less permissive.
The Ubuntu operating system must configure the /var/log directory to be group-owned by syslog.
The Ubuntu operating system must configure the /var/log directory to be owned by root.
The Ubuntu operating system must configure the /var/log directory to have mode 0755 or less permissive.
The Ubuntu operating system must configure the /var/log/syslog file to be group-owned by adm.
The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.
The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.
The Ubuntu operating system must configure the /var/log directory to have mode "0755" or less permissive.
PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
The DBMS must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
The operating system must reveal error messages only to authorized users.
AIX log files must be owned by a system account.
AIX log files must be owned by a system group.
AIX log files must have mode 0640 or less permissive.
AIX log files must not have extended ACLs, except as needed to support authorized software.
CA-ACF2 must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
CA-TSS must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
IBM RACF must limit access to data sets used to back up and/or dump SMF collection files to appropriate users and/or batch jobs that perform SMF dump processing.
MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
SQL Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
The system must be configured to audit Account Management - User Account Management failures.
Windows Server 2022 permissions on the Active Directory data files must only allow System and Administrators access.
The DBMS must restrict error messages, so only authorized personnel may view them.
The DBMS must restrict error messages so only authorized personnel may view them.
The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.
PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
The OL 8 "/var/log/messages" file must have mode 0640 or less permissive.
The OL 8 "/var/log/messages" file must be owned by root.
The OL 8 "/var/log/messages" file must be group-owned by root.
The OL 8 "/var/log" directory must have mode 0755 or less permissive.
The OL 8 "/var/log" directory must be owned by root.
The OL 8 "/var/log" directory must be group-owned by root.
The OL 8 lastlog command must have a mode of "0750" or less permissive.
The OL 8 lastlog command must be owned by root.
The OL 8 lastlog command must be group-owned by root.
The Palo Alto Networks security platform must block traceroutes and ICMP probes originating from untrusted networks (e.g., ISP and other non-DoD networks).
Administrators in the role of Security Administrator, Cryptographic Administrator, or Audit Administrator must not also have the role of Audit Administrator.
Automation Controller's log files must be accessible by explicitly defined privilege.
The RHEL 8 /var/log/messages file must have mode 0640 or less permissive.
The RHEL 8 /var/log/messages file must be owned by root.
The RHEL 8 /var/log/messages file must be group-owned by root.
The RHEL 8 /var/log directory must have mode 0755 or less permissive.
The RHEL 8 /var/log directory must be owned by root.
The RHEL 8 /var/log directory must be group-owned by root.
The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.
RHEL 9 /var/log directory must have mode 0755 or less permissive.
RHEL 9 /var/log/messages file must have mode 0640 or less permissive.
The SUSE operating system must prevent unauthorized users from accessing system error messages.
RHEL 9 /var/log directory must be owned by root.
RHEL 9 /var/log directory must be group-owned by root.
RHEL 9 /var/log/messages file must be owned by root.
RHEL 9 /var/log/messages file must be group-owned by root.
RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
RHEL 9 audit log directory must be owned by root to prevent unauthorized read access.
RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.
The operating system must reveal error messages only to authorized personnel.
The VMM must reveal system error messages only to authorized users.
The Photon operating system "/var/log" directory must be owned by root.
The Photon operating system messages file must have the correct ownership and file permissions.
VMware Postgres must provide nonprivileged users with minimal error information.
The Photon operating system must reveal error messages only to authorized users.
The vCenter PostgreSQL service must provide nonprivileged users with minimal error information.
The application must be configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
The macOS system must configure Apple System Log (ASL) files owned by root and group to wheel.
The macOS system must configure Apple System Log (ASL) files to mode 640 or less permissive.
The macOS system must configure system log files owned by root and group to wheel.
Ubuntu 22.04 LTS must configure the "/var/log" directory to have mode "755" or less permissive.
Ubuntu 22.04 LTS must configure "/var/log/syslog" file with mode "640" or less permissive.
Ubuntu 22.04 LTS must configure the directories used by the system journal to be owned by "root".
Ubuntu 22.04 LTS must configure the directories used by the system journal to be group-owned by "systemd-journal".
Ubuntu 22.04 LTS must configure the files used by the system journal to be owned by "root".
Ubuntu 22.04 LTS must configure the files used by the system journal to be group-owned by "systemd-journal".
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is owned by "root".
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is group-owned by "root".
Ubuntu 22.04 LTS must configure the "/var/log" directory to be owned by "root".
Ubuntu 22.04 LTS must configure the "/var/log" directory to be group-owned by "syslog".
Ubuntu 22.04 LTS must configure "/var/log/syslog" file to be owned by "syslog".
Ubuntu 22.04 LTS must configure the "/var/log/syslog" file to be group-owned by "adm".
PostgreSQL must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).
MongoDB must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).
SQL Server must reveal detailed error messages only to documented and approved individuals or roles.
SLEM 5 must prevent unauthorized users from accessing system error messages.
TOSS must reveal error messages only to authorized users.