info: name: /etc/(r)syslog.conf File Owner and Permission Check author: songyaeji severity: high description: > If the /etc/syslog.conf or /etc/rsyslog.conf file is not owned by root or has insecure permissions, attackers may manipulate logging settings to avoid detection. reference: - https://isms.kisa.or.kr - KISA Cloud Vulnerability Assessment Guide (2024) tags: linux,configuration,logging,permissions,rsyslog,syslog metadata: verified: true os: linux max-request: 2 classification: cwe-id: CWE-732 cvss-metrics: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.4