CCE-92607-1Platform: cpe:/o:oracle:linux:7 | Date: (C)2019-11-07 (M)2023-07-04 |
At a minimum the audit system should collect administrator actions
for all users and root. If the 'auditd' daemon is configured to use the
'augenrules' program to read audit rules during daemon startup (the default),
add the following line to a file with suffix '.rules' in the directory
'/etc/audit/rules.d':
'-w /etc/sudoers -p wa -k actions'
If the 'auditd' daemon is configured to use the 'auditctl'
utility to read audit rules during daemon startup, add the following line to
'/etc/audit/audit.rules' file:
'-w /etc/sudoers -p wa -k actions'
Parameter:
[yes/no]
Technical Mechanism:
The actions taken by system administrators should be audited to keep a record
of what was executed on the system, as well as, for accountability purposes.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.9 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:49549 |