Details
The audit_user file may be used to selectively audit more, or fewer, auditing features for specific individuals. If used this way it could subject the activity to a lawsuit and could cause the loss of valuable auditing data in the case of a system compromise. If an item is audited for one individual (other than for root and administrative users - who have more auditing features) it must be audited for all.
Solution
Edit the audit_user file and remove specific user configurations differing from the global audit settings.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-12c.
- CAT|II
- CCI|CCI-000172
- CSCv6|6.2
- Rule-ID|SV-226406r603265_rule
- STIG-ID|GEN000000-SOL00040
- STIG-Legacy|SV-4353
- STIG-Legacy|V-4353
- Vuln-ID|V-226406
Comments
Please sign in to leave a comment.