UCF STIG Viewer Logo

The Photon operating system must configure auditd to log to disk.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239082 PHTN-67-000010 SV-239082r675054_rule Medium
Description
Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content must be shipped to a central location, but it must also be logged locally. Satisfies: SRG-OS-000037-GPOS-00015, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019
STIG Date
VMware vSphere 6.7 Photon OS Security Technical Implementation Guide 2022-06-17

Details

Check Text ( C-42293r675052_chk )
At the command line, execute the following command:

# grep "^write_logs" /etc/audit/auditd.conf

Expected result:

write_logs = yes

If there is no output, this is not a finding.

If the output does not match the expected result, this is a finding.
Fix Text (F-42252r675053_fix)
Open /etc/audit/auditd.conf with a text editor.

Ensure that the "write_logs" line is uncommented and set to the following:

write_logs = yes

At the command line, execute the following command:

# service auditd reload