UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use a separate file system for the system audit data path.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72063 RHEL-07-021330 SV-86687r4_rule Low
Description
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.
STIG Date
Red Hat Enterprise Linux 7 Security Technical Implementation Guide 2017-07-08

Details

Check Text ( C-72295r8_chk )
Verify that a separate file system/partition has been created for the system audit data path.

Check that a file system/partition has been created for the system audit data path with the following command:

# grep /var/log/audit /etc/fstab
UUID=3645951a /var/log/audit ext4 defaults 1 2

If a separate entry for /var/log/audit does not exist, ask the System Administrator (SA) if the system audit logs are being written to a different file system/partition on the system, then grep for that file system/partition.

If a separate file system/partition does not exist for the system audit data path, this is a finding.
Fix Text (F-78415r1_fix)
Migrate the system audit data path onto a separate file system.