STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-245561

CAT II (Medium)

The AIX /etc/syslog.conf file must be owned by root.

Rule ID

SV-245561r991589_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Unauthorized ownership of the /etc/syslog.conf file can lead to the ability for a malicious actor to alter or disrupt system logging activities. This can aid the malicious actor in avoiding detection and further their ability to conduct malicious activities on the system.

Check Content

Check the ownership of /etc/syslog.conf using command:
# ls -al /etc/syslog.conf

The above command should yield the following output:
-rw-r----- 1 root system 993 Mar 11 07:04 /etc/syslog.conf

If the file is not owned by root, this is a finding.

Fix Text

Change the ownership of the file to root using command: 
# chown root /etc/syslog.conf