Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-811 | GEN002660 | SV-38946r1_rule | ECAR-1 ECAR-2 ECAR-3 | Medium |
Description |
---|
Without auditing, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account. |
STIG | Date |
---|---|
Draft AIX Security Technical Implementation Guide | 2011-08-17 |
Check Text ( C-28347r1_chk ) |
---|
Determine if auditing is enabled. # /usr/sbin/audit query | head -1 If the response Auditing On is not returned, this is a finding. |
Fix Text (F-32465r1_fix) |
---|
Use SMIT or command line to enable auditing on the system. #audit start Additionally, make sure auditing subsystem starts on system startup. #mkitab -i cron "audit:2:once:/usr/sbin/audit start 2>&1 > /dev/console" |