4.1.9 Ensure session initiation information is collected - auditctl utmp

Information

Monitoring these files for changes could alert a system administrator to logins occurring at unusual hours, which could indicate intruder activity (i.e. a user logging in at a time when they do not normally log in).

Solution

Add the following lines to the /etc/audit/audit.rules file:
-w /var/run/utmp -p wa -k session
-w /var/log/wtmp -p wa -k session
-w /var/log/btmp -p wa -k session

See Also

https://workbench.cisecurity.org/files/1863

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CSCv6|5.5, CSCv6|16.4, CSCv6|16.10

Plugin: Unix

Control ID: 11660c1a67e05399baa0b7c19f97e44963e7b8f94c6d51d1a7775445586877f4