Check: OSX8-00-00125
Apple OSX 10.8 STIG:
OSX8-00-00125
(in version v1 r2)
Title
The operating system must automatically audit account modification. (Cat II impact)
Discussion
Once an attacker establishes initial access to a system, they often attempt to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to simply modify an existing account. Auditing of account modification is one method and best practice for mitigating this risk. A comprehensive account management process will ensure an audit trail which documents the modification of user accounts and, as required, notifies appropriate individuals.
Check Content
In order to view the currently configured flags for the audit daemon, run the following command: sudo grep ^flags /etc/security/audit_control | sed 's/flags://' | tr "," "\n" | grep ad The account creation events are logged by way of the "ad" flag. If "ad" is not listed in the result of the check, this is a finding.
Fix Text
To make sure the appropriate flags are enabled for auditing, run the following command: sudo sed -i.bak '/^flags/ s/$/,ad/' /etc/security/audit_control
Additional Identifiers
Rule ID: SV-65615r1_rule
Vulnerability ID: V-51405
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001403 |
The information system automatically audits account modification actions. |
Controls
Number | Title |
---|---|
AC-2 (4) |
Automated Audit Actions |