Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-208909 | OL6-00-000201 | SV-208909r603263_rule | Low |
Description |
---|
The actions taken by system administrators should be audited to keep a record of what was executed on the system, as well as, for accountability purposes. |
STIG | Date |
---|---|
Oracle Linux 6 Security Technical Implementation Guide | 2021-06-14 |
Check Text ( C-9162r357707_chk ) |
---|
To verify that auditing is configured for system administrator actions, run the following command: $ sudo grep -w "/etc/sudoers" /etc/audit/audit.rules If the system is configured to watch for changes to its sudoers configuration, a line should be returned (including "-p wa" indicating permissions that are watched). If there is no output, this is a finding. |
Fix Text (F-9162r357708_fix) |
---|
At a minimum, the audit system should collect administrator actions for all users and root. Add the following to "/etc/audit/audit.rules": -w /etc/sudoers -p wa -k actions |