UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.


Overview

Finding ID Version Rule ID IA Controls Severity
V-91521 AIX7-00-002036 SV-101619r1_rule Medium
Description
The report generation capability must support on-demand review and analysis in order to facilitate the organization's ability to generate incident reports, as needed, to better handle larger-scale or more complex security incidents. If the report generation capability does not support after-the-fact investigations, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack, or identify those responses for one. This capability is also required to comply with applicable Federal laws and DoD policies. Report generation must be capable of generating on-demand (i.e., customizable, ad hoc, and as-needed) reports. On-demand reporting allows personnel to report issues more rapidly to more effectively meet reporting requirements. Collecting log data and aggregating it to present the data in a single, consolidated report achieves this objective. Satisfies: SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2020-02-24

Details

Check Text ( C-90675r3_chk )
Check to see if the application for generating audit reports exists ("/usr/sbin/auditpr"):

# ls -l /usr/sbin/auditpr
-r-sr-x--- 1 root audit 54793 Feb 14 2017 /usr/sbin/auditpr

If the file does not exist, this is a finding.
Fix Text (F-97719r1_fix)
Use the installp command to install a fileset (assume cd is mounted).
# installp -aXYqg -d /dev/cd0 bos.rte.security