Configure grub or lilo so that processes that are capable of being audited can be audited even if they start up prior to auditd startup.
Rationale:
Audit events need to be captured on processes that start up prior to auditd, so that potential malicious activity cannot go undetected.
[yes]
Edit /etc/default/grub to include audit=1 as part of GRUB_CMDLINE_LINUX:
GRUB_CMDLINE_LINUX=audit=1
And run the following command to update the grub configuration:
# update-grub
oval:org.secpod.oval:def:92214
oval:org.secpod.oval:def:85133
oval:org.secpod.oval:def:65967
SCAP Repo OVAL Definition
2023-08-23