Check: SLEM-05-653045
SUSE Linux Enterprise Micro (SLEM) 5 STIG:
SLEM-05-653045
(in version v1 r1)
Title
Audispd must take appropriate action when SLEM 5 audit storage is full. (Cat II impact)
Discussion
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
Check Content
Verify the audit system offloads audit records if SLEM 5 storage volume becomes full. Check that the records are properly offloaded to a remote server with the following command: > sudo grep -i "disk_full_action" /etc/audisp/audisp-remote.conf disk_full_action = syslog If "disk_full_action" is not set to "syslog", "single", or "halt" or the line is commented out, this is a finding.
Fix Text
Configure SLEM 5 to take the appropriate action if the audit storage is full. Add or modify the following line in the "/etc/audisp/audisp-remote.conf" file: disk_full_action = syslog
Additional Identifiers
Rule ID: SV-261417r996662_rule
Vulnerability ID: V-261417
Group Title: SRG-OS-000479-GPOS-00224
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001851 |
Transfer audit logs per organization-defined frequency to a different system, system component, or media than the system or system component conducting the logging. |
Controls
Number | Title |
---|---|
AU-4(1) |
Transfer to Alternate Storage |