File: shared.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (27 lines) | stat: -rw-r--r-- 1,133 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
srg_requirement: |-
    {{{ full_name }}} audit service must be enabled.

vuldiscussion: |-
    Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Ensuring the "auditd" service is active ensures audit records generated by the kernel are appropriately recorded.

    Additionally, a properly configured audit subsystem ensures that actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.



checktext: |-
    Verify the audit service is configured to produce audit records with the following command:

    $ systemctl status auditd.service

    auditd.service - Security Auditing Service
    Loaded:loaded (/usr/lib/systemd/system/auditd.service; enabled; vendor preset: enabled)
    Active: active (running) since Tues 2022-05-24 12:56:56 EST; 4 weeks 0 days ago

    If the audit service is not "active" and "running", this is a finding.

fixtext: |-
    To enable the auditd service run the following command:

    $ sudo systemctl enable --now auditd