From Sun Ray 4 STIG
Part of Sun Ray server log permissions
Associated with IA controls: ECCD-2, ECAN-1, ECCD-1
The Sun Ray server logs should be appropriately secured, having file permissions that restrict unauthorized changes or viewing. Unauthorized users accessing the audit logs may delete, modify, or change data within the logs for malicious purposes. Any alternation in the audit logs will not give the system administrator an accurate history of the events that occurred.
On the Sun Ray server perform the following: # ls -al /var/opt/SUNWut/log | less Log files that should be 640: admin_log auth_log utmountd.log utstoraged.log messages utwebadmin.log If any of the audit log file permissions are greater than 640, this is a finding. If the audit logs are on an external syslog server, ensure permissions are 640. If they are not, this is a finding.
Configure the Sun Ray server logs permissions to 640.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer