Verify Permissions of Files in /var/log/sssd

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

To properly set the permissions of /var/log/sssd/*, run the command:

$ sudo chmod 0660 /var/log/sssd/*

Rationale

The /var/log/sssd directory contains debug logs for the System Security Services Daemon (SSSD) and should only be accessed by authorized personnel.

Remediation

Shell script

The following script can be run on the host to remediate the issue.

#!/bin/bash

find  /var/log/sssd/  -perm /u+xs,g+xs,o+xwrt  -type f -regextype posix-extended -regex '.*' -exec chmod u-xs,g-xs,o-xwrt {} \;

Ansible playbook

The following playbook can be run with Ansible to remediate the issue.

- name: Find /var/log/sssd/ file(s) recursively
  command: find  /var/log/sssd/  -perm /u+xs,g+xs,o+xwrt  -type f -regextype posix-extended
    -regex ".*"
  register: files_found
  changed_when: false
  failed_when: false
  check_mode: false
  tags:
  - configure_strategy
  - file_permissions_var_log_sssd
  - low_complexity
  - low_disruption
  - medium_severity
  - no_reboot_needed

- name: Set permissions for /var/log/sssd/ file(s)
  file:
    path: '{{ item }}'
    mode: u-xs,g-xs,o-xwrt
    state: file
  with_items:
  - '{{ files_found.stdout_lines }}'
  tags:
  - configure_strategy
  - file_permissions_var_log_sssd
  - low_complexity
  - low_disruption
  - medium_severity
  - no_reboot_needed