Check: SLES-15-030640
SUSE Linux Enterprise Server 15 STIG:
SLES-15-030640
(in versions v2 r3 through v1 r1)
Title
The SUSE operating system must generate audit records for all uses of the privileged functions. (Cat III impact)
Discussion
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000359-GPOS-00146, SRG-OS-000365-GPOS-00152
Check Content
Verify the SUSE operating system generates an audit record for any privileged use of the "execve" system call. > sudo auditctl -l | grep -w 'execve' -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid If both the "b32" and "b64" audit rules for "SUID" files are not defined, this is a finding. If both the "b32" and "b64" audit rules for "SGID" files are not defined, this is a finding. Note: The "-k" allows for specifying an arbitrary identifier. The string following "-k" does not need to match the example output above.
Fix Text
Configure the SUSE operating system to generate an audit record for any privileged use of the "execve" system call. Add or update the following rules in "/etc/audit/rules.d/audit.rules": -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k setuid -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k setgid -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k setgid To reload the rules file, restart the audit daemon: > sudo systemctl restart auditd.service or issue the following command: > sudo augenrules --load
Additional Identifiers
Rule ID: SV-234963r1009638_rule
Vulnerability ID: V-234963
Group Title: SRG-OS-000327-GPOS-00127
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001814 |
The Information system supports auditing of the enforcement actions. |
CCI-001875 |
Provide an audit reduction capability that supports on-demand audit review and analysis. |
CCI-001877 |
Provide an audit reduction capability that supports after-the-fact investigations of incidents. |
CCI-001878 |
Provide a report generation capability that supports on-demand audit review and analysis. |
CCI-001879 |
Provide a report generation capability that supports on-demand reporting requirements. |
CCI-001880 |
Provide a report generation capability that supports after-the-fact investigations of security incidents. |
CCI-001881 |
Provide an audit reduction capability that does not alter original content or time ordering of audit records. |
CCI-001882 |
Provide a report generation capability that does not alter original content or time ordering of audit records. |
CCI-001889 |
Record time stamps for audit records that meet organization-defined granularity of time measurement. |
CCI-001914 |
Provide the capability for organization-defined individuals or roles to change the logging to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds. |
CCI-002234 |
Log the execution of privileged functions. |
CCI-003938 |
Automatically generate audit records of the enforcement actions. |