UCF STIG Viewer Logo

The HYCU server must generate audit records containing information that establishes the identity of any individual or process associated with the event.


Overview

Finding ID Version Rule ID IA Controls Severity
V-246836 HYCU-AU-000013 SV-246836r768172_rule Medium
Description
Without information that establishes the identity of the subjects (i.e., administrators or processes acting on behalf of administrators) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Event identifiers (if authenticated or otherwise known) include, but are not limited to, user database tables, primary key values, user names, or process identifiers.
STIG Date
HYCU for Nutanix Security Technical Implementation Guide 2021-08-03

Details

Check Text ( C-50268r768170_chk )
Check the contents of the "/var/log/audit/audit.log" file.

HYCU also maintains Event (Audit) information in the "HYCU Web UI Events" menu.

Verify the audit log contains records showing the identity of an individual or process associated with the event.

If the audit log is not configured or does not have required contents, this is a finding.
Fix Text (F-50222r768171_fix)
Log on to the HYCU VM console and load the STIG audit rules by using the following commands.

1. cp /usr/share/doc/audit/rules/10-base-config.rules /usr/share/doc/audit/rules/30-stig.rules /usr/share/doc/audit/rules/31-privileged.rules /usr/share/doc/audit/rules/99-finalize.rules /etc/audit/rules.d/

2. augenrules --load