UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The audit system must identify staff members to receive notifications of audit log storage volume capacity issues.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38680 RHEL-06-000313 SV-50481r1_rule Medium
Description
Email sent to the root account is typically aliased to the administrators of the system, who can take appropriate action.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-05-19

Details

Check Text ( C-46241r1_chk )
Inspect "/etc/audit/auditd.conf" and locate the following line to determine if the system is configured to send email to an account when it needs to notify an administrator:

action_mail_acct = root


If auditd is not configured to send emails per identified actions, this is a finding.
Fix Text (F-43629r1_fix)
The "auditd" service can be configured to send email to a designated account in certain situations. Add or correct the following line in "/etc/audit/auditd.conf" to ensure that administrators are notified via email for those situations:

action_mail_acct = root