RHEL 10 must enforce root ownership of the "/etc/audit/" directory.

STIG ID: RHEL-10-400195  |  SRG: SRG-OS-000063-GPOS-00032 |  Severity: medium (CAT II)  |  CCI: CCI-000171 |  Vulnerability Id: V-281056

Vulnerability Discussion

The "/etc/audit/" directory contains files that ensure the proper auditing of command execution, privilege escalation, file manipulation, and more. Protection of this directory is critical for system security.

Check

Verify RHEL 10 enforces root ownership of the "/etc/audit/" directory with the following command:

$ sudo stat -c "%U %n" /etc/audit/
root /etc/audit/

If the "/etc/audit/" directory does not have an owner of "root", this is a finding.

Fix

Configure RHEL 10 so that the "/etc/audit/" directory is owned by "root" with the following command:

$ sudo chown root /etc/audit/