Check: GEN002753
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE:
GEN002753
(in versions v1 r14 through v1 r10)
Title
The audit system must be configured to audit account termination. (Cat III impact)
Discussion
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
Check Content
Determine if the system is configured to audit account termination. Procedure: # more /etc/security/audit/events If auditing of the USER_Remove event is not configured, this is a finding. Verify the USER_Remove audit event is defined in the audit classes' stanza classes: of the /etc/security/audit/config file. Procedure: #more /etc/security/audit/config Make note of the audit class(es) the USER_Remove event is associated with. If the USER_Remove event is not associated with any audit classes in the classes: stanza, this is a finding. Verify that the audit class is associated with the default user and all other user ids listed in the 'users:' stanza of the /etc/security/audit/config file. Procedure: #more /etc/security/audit/config If the class(es) that the USER_Remove event is not associated with the default user and all the system users in the users: stanza, this is a finding.
Fix Text
Configure the system to audit account termination. Edit /etc/security/audit/events and add the USER_Remove event to the list of audited events Edit /etc/security/audit/config and add the USER_Remove audit event to an audit class in the classes: stanza. Edit the /etc/security/audit/config and assign the audit classes with the USER_Remove event to the all users listed in the users: stanza.
Additional Identifiers
Rule ID: SV-38854r1_rule
Vulnerability ID: V-22382
Group Title: GEN002753
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001405 |
The information system automatically audits account removal actions. |
Controls
Number | Title |
---|---|
AC-2 (4) |
Automated Audit Actions |