UCF STIG Viewer Logo

The file integrity tool must be configured to verify extended attributes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22508 GEN006571 SV-45918r1_rule Low
Description
Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-43226r1_chk )
If using an Advanced Intrusion Detection Environment (AIDE), verify the configuration contains the "xattrs" option for all monitored files and directories.

Procedure:
Check for the default location /etc/aide/aide.conf
or:
# find / -name aide.conf

# egrep "[+]?xattrs"
If the option is not present. This is a finding.
If using a different file integrity tool, check the configuration per tool documentation.
Fix Text (F-39296r1_fix)
If using an Advanced Intrusion Detection Environment (AIDE), verify the configuration contains the "xattrs" option for all monitored files and directories.

Procedure:
Check for the default location /etc/aide/aide.conf
or:
# find / -name aide.conf

# egrep "[+]?xattrs"
If the option is not present. This is a finding.
If using a different file integrity tool, check the configuration per tool documentation.