[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92607-1

Platform: cpe:/o:oracle:linux:7Date: (C)2019-11-07   (M)2023-07-04



At a minimum the audit system should collect administrator actions for all users and root. If the 'auditd' daemon is configured to use the 'augenrules' program to read audit rules during daemon startup (the default), add the following line to a file with suffix '.rules' in the directory '/etc/audit/rules.d': '-w /etc/sudoers -p wa -k actions' If the 'auditd' daemon is configured to use the 'auditctl' utility to read audit rules during daemon startup, add the following line to '/etc/audit/audit.rules' file: '-w /etc/sudoers -p wa -k actions'


Parameter:

[yes/no]


Technical Mechanism:

The actions taken by system administrators should be audited to keep a record of what was executed on the system, as well as, for accountability purposes.

CCSS Severity:CCSS Metrics:
CCSS Score : 5.9Attack Vector: LOCAL
Exploit Score: 2.5Attack Complexity: LOW
Impact Score: 3.4Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LScope: UNCHANGED
 Confidentiality: LOW
 Integrity: LOW
 Availability: LOW
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:49549


OVAL    1
oval:org.secpod.oval:def:49549
XCCDF    1
xccdf_org.secpod_benchmark_general_OEL_7

© SecPod Technologies