Check: SLEM-05-654090
SUSE Linux Enterprise Micro (SLEM) 5 STIG:
SLEM-05-654090
(in version v1 r1)
Title
SLEM 5 must generate audit records for all uses of the "setfacl" command. (Cat II impact)
Discussion
Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).
Check Content
Verify SLEM 5 generates an audit record for all uses of the "setfacl" command with the following command: > sudo auditctl -l | grep -w '/usr/bin/setfacl' -a always,exit -S all -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=-1 -F key=prim_mod If the command does not return any output, this is a finding. Note: The "key=" value is arbitrary and can be different from the example output above.
Fix Text
Configure SLEM 5 to generate an audit record for all uses of the "setfacl" command. Add or modify the following line in the "/etc/audit/rules.d/audit.rules" file: -a always,exit -F path=/usr/bin/setfacl -F perm=x -F auid>=1000 -F auid!=unset -k prim_mod To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
Additional Identifiers
Rule ID: SV-261441r996730_rule
Vulnerability ID: V-261441
Group Title: SRG-OS-000037-GPOS-00015
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000130 |
Ensure that audit records contain information that establishes what type of event occurred. |
CCI-000169 |
Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2 a on organization-defined information system components. |