Details
If security personnel are not notified immediately when storage volume reaches 75% utilization, they are unable to plan for audit record storage capacity expansion.
Solution
Edit /etc/audit/auditd.conf and set the space_left_action parameter to 'exec' or 'email'.
If the space_left_action parameter is set to 'email' set the action_mail_acct parameter to an e-mail address for the System Administrator (SA) and Information System Security Officer (ISSO).
If the space_left_action parameter is set to 'exec', make sure the command being execute notifies the System Administrator (SA) and Information System Security Officer (ISSO).
Edit /etc/audit/auditd.conf and set the space_left parameter to be, at least, 25% of the repository maximum audit record storage capacity.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-5(1)
- CAT|III
- CCI|CCI-001855
- Rule-ID|SV-219152r610963_rule
- STIG-ID|UBTU-18-010006
- STIG-Legacy|SV-109633
- STIG-Legacy|V-100529
- Vuln-ID|V-219152
Comments
Please sign in to leave a comment.