UCF STIG Viewer Logo

The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux).


Overview

Finding ID Version Rule ID IA Controls Severity
V-208892 OL6-00-000183 SV-208892r793678_rule Low
Description
The system's mandatory access policy (SELinux) should not be arbitrarily changed by anything other than administrator action. All changes to MAC policy should be audited.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2021-12-03

Details

Check Text ( C-9145r357656_chk )
To determine if the system is configured to audit changes to its SELinux configuration files, run the following command:

$ sudo grep -w "/etc/selinux" /etc/audit/audit.rules

If the system is configured to watch for changes to its SELinux configuration, a line should be returned (including "-p wa" indicating permissions that are watched).

If the system is not configured to audit attempts to change the MAC policy, this is a finding.
Fix Text (F-9145r357657_fix)
Add the following to "/etc/audit/audit.rules":

-w /etc/selinux/ -p wa -k MAC-policy