Check: RHEL-09-252060
RHEL 9 STIG:
RHEL-09-252060
(in versions v1 r3 through v1 r1)
Title
RHEL 9 must forward mail from postmaster to the root account using a postfix alias. (Cat II impact)
Discussion
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an impending failure of the audit capability, and system operation may be adversely affected. Audit processing failures include software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded.
Check Content
Verify that the administrators are notified in the event of an audit processing failure. Check that the "/etc/aliases" file has a defined value for "root". $ sudo grep "postmaster:\s*root$" /etc/aliases If the command does not return a line, or the line is commented out, ask the system administrator to indicate how they and the information systems security officer (ISSO) are notified of an audit process failure. If there is no evidence of the proper personnel being notified of an audit processing failure, this is a finding.
Fix Text
Configure a valid email address as an alias for the root account. Append the following line to "/etc/aliases": postmaster: root Then, run the following command: $ sudo newaliases
Additional Identifiers
Rule ID: SV-257953r925846_rule
Vulnerability ID: V-257953
Group Title: SRG-OS-000046-GPOS-00022
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000139 |
The information system alerts designated organization-defined personnel or roles in the event of an audit processing failure. |
Controls
Number | Title |
---|---|
AU-5 |
Response To Audit Processing Failures |