[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Operating System must generate audit records for any use of the sudo command.

ID: oval:org.secpod.oval:def:97813Date: (C)2024-02-08   (M)2024-02-12
Class: COMPLIANCEFamily: unix




Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). The sudo command allows a permitted user to execute a command as the superuser or another user as specified by the security policy.When a user logs on, the AUID is set to the UID of the account that is being authenticated. Daemons are not user sessions and have the loginuid set to -1. The AUID representation is an unsigned 32-bit integer, which equals 4294967295. The audit system interprets -1, 4294967295, and unset in the same way.

Platform:
Ubuntu 20.04
Reference:
CCE-95757-1
CPE    1
cpe:/o:ubuntu:ubuntu_linux:20.04
CCE    1
CCE-95757-1
XCCDF    1
xccdf_org.secpod_benchmark_general_Ubuntu_20.04

© SecPod Technologies