Check: RHEL-06-000313
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000313
(in versions v2 r2 through v1 r14)
Title
The audit system must identify staff members to receive notifications of audit log storage volume capacity issues. (Cat II impact)
Discussion
Email sent to the root account is typically aliased to the administrators of the system, who can take appropriate action.
Check Content
Inspect "/etc/audit/auditd.conf" and locate the following line to determine if the system is configured to send email to an account when it needs to notify an administrator: action_mail_acct = root If auditd is not configured to send emails per identified actions, this is a finding.
Fix Text
The "auditd" service can be configured to send email to a designated account in certain situations. Add or correct the following line in "/etc/audit/auditd.conf" to ensure that administrators are notified via email for those situations: action_mail_acct = root
Additional Identifiers
Rule ID: SV-218057r603264_rule
Vulnerability ID: V-218057
Group Title: SRG-OS-000046
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000139 |
The information system alerts designated organization-defined personnel or roles in the event of an audit processing failure. |
Controls
Number | Title |
---|---|
AU-5 |
Response To Audit Processing Failures |