UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audispd must take appropriate action when SLEM 5 audit storage is full.


Overview

Finding ID Version Rule ID IA Controls Severity
V-261417 SLEM-05-653045 SV-261417r996662_rule Medium
Description
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
STIG Date
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide 2024-06-04

Details

Check Text ( C-65146r996661_chk )
Verify the audit system offloads audit records if SLEM 5 storage volume becomes full.

Check that the records are properly offloaded to a remote server with the following command:

> sudo grep -i "disk_full_action" /etc/audisp/audisp-remote.conf
disk_full_action = syslog

If "disk_full_action" is not set to "syslog", "single", or "halt" or the line is commented out, this is a finding.
Fix Text (F-65054r996117_fix)
Configure SLEM 5 to take the appropriate action if the audit storage is full.

Add or modify the following line in the "/etc/audisp/audisp-remote.conf" file:

disk_full_action = syslog