13ecf0f821
Log files that may contain secure information should have restricted permissions. This includes all -api log files, as well as log files in which the operator login and authententication attempts are logged. Change-Id: I56ef476609d65991529ba0a6311ebd29a7710386 Closes-Bug: 1836632 Signed-off-by: Don Penney <don.penney@windriver.com> |
||
---|---|---|
.. | ||
audit-config | ||
docker-config | ||
io-scheduler/centos | ||
iptables-config | ||
memcached-custom | ||
ntp-config | ||
pam-config | ||
rsync-config | ||
shadow-utils-config | ||
sudo-config | ||
syslog-ng-config | ||
util-linux-config |