FIPS Operational Environment: Difference between revisions

Jump to navigation Jump to search
Line 27: Line 27:
===Access to Audit Data===
===Access to Audit Data===


The NSS module uses the audit mechanism provided by the operating system to audit events, so the NSS audit data are stored in the system audit log. The system audit log can only be read or modified by the root user.
The NSS module uses the audit mechanism provided by the operating system to audit events, so the NSS audit data are stored in the system audit log. Only the root user can read or modify the system audit log.


On Red Hat Enterprise Linux 4, the system audit log is in the <code>/var/log/audit</code> directory. This directory and the log files in it have the following permission bits (the following commands were run as the root user; only the root user can run the second command):
On Red Hat Enterprise Linux 4, the system audit log is in the <code>/var/log/audit</code> directory. This directory and the log files in it have the following permission bits (the following commands were run as the root user; only the root user can run the second command):
canmove, Confirmed users
937

edits

Navigation menu