Check: AZLX-23-002180
Amazon Linux 2023 STIG:
AZLX-23-002180
(in version v1 r1)
Title
Amazon Linux 2023 must audit all uses of the reboot command. (Cat II impact)
Discussion
Misuse of the reboot command may cause availability issues for the system.
Check Content
Verify Amazon Linux 2023 is configured to audit the execution of the "reboot" command with the following command: $ sudo auditctl -l | grep reboot -a always,exit -F path=/usr/sbin/reboot -F perm=x -F auid>=1000 -F auid!=unset -k privileged-reboot If the command does not return a line, or the line is commented out, this is a finding.
Fix Text
Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful uses of the "reboot" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/sbin/reboot -F perm=x -F auid>=1000 -F auid!=unset -k privileged-reboot To load the rules to the kernel immediately, use the following command: $ sudo augenrules --load
Additional Identifiers
Rule ID: SV-274099r1120285_rule
Vulnerability ID: V-274099
Group Title: SRG-OS-000477-GPOS-00222
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000172 |
Generate audit records for the event types defined in AU-2 c that include the audit record content defined in AU-3. |
Controls
| Number | Title |
|---|---|
| AU-12 |
Audit Record Generation |