UCF STIG Viewer Logo

The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux).


Overview

Finding ID Version Rule ID IA Controls Severity
V-217961 RHEL-06-000183 SV-217961r505923_rule Low
Description
The system's mandatory access policy (SELinux) should not be arbitrarily changed by anything other than administrator action. All changes to MAC policy should be audited.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-19442r376898_chk )
To determine if the system is configured to audit changes to its SELinux configuration files, run the following command:

$ sudo grep -w "/etc/selinux" /etc/audit/audit.rules

If the system is configured to watch for changes to its SELinux configuration, a line should be returned (including "-p wa" indicating permissions that are watched).

If the system is not configured to audit attempts to change the MAC policy, this is a finding.
Fix Text (F-19440r376899_fix)
Add the following to "/etc/audit/audit.rules":

-w /etc/selinux/ -p wa -k MAC-policy