UCF STIG Viewer Logo

The audit system must be configured to audit account creation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22376 GEN002750 SV-38851r1_rule ECAT-1 Low
Description
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises, and damages incurred during a system compromise.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-37844r1_chk )
Determine if the audit system is configured to audit account creation.

Procedure:
# more /etc/security/audit/events
If auditing of the USER_Create event is not configured, check the USER_Create audit event is defined in the audit classes' stanza of the /etc/security/audit/config file.

Procedure:
#more /etc/security/audit/config
Make note of the audit class the USER_Create event is associated with.
If the USER_Create event is not associated with any audit classes in the classes: stanza this is a finding.

Verify the audit class is associated with the default user and all other user ids listed in the users: stanza of the /etc/security/audit/config file.
Procedure:
#more /etc/security/audit/config
If the class(es) the USER_Create event is not associated with the default user and all the system users in the ‘users’: stanza, this is a finding.
Fix Text (F-33107r1_fix)
Configure the audit system to audit account creation.

Edit /etc/security/audit/events and add the User_Create event to the list of audited events.

Edit /etc/security/audit/config and add the USER_Create audit event to an audit class in the classes: stanza.

Edit the /etc/security/audit/config and assign the audit classes with the USER_Create event to the all users listed in the users: stanza.