4.1.18 Ensure the audit configuration is immutable

Information

Set system audit so that audit rules cannot be modified with auditctl . Setting the flag '-e 2' forces audit to be put in immutable mode. Audit changes can only be made on system reboot.

Rationale:

In immutable mode, unauthorized users cannot execute changes to the audit system to potentially hide malicious activity and then put the audit rules back. Users would most likely notice a system reboot and that could alert administrators of an attempt to make unauthorized audit changes.

Solution

Add the following line to the end of the /etc/audit/audit.rules file.

-e 2

Additional Information:

This setting will ensure reloading the auditd config to set active settings requires a system reboot.

See Also

https://workbench.cisecurity.org/files/3399

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-1, 800-53|AU-2, CSCv6|3, CSCv6|6, CSCv7|6.2, CSCv7|6.3

Plugin: Unix

Control ID: 1e8f9d3b2b5841d3f3bcc83037a419dceb7436c6761f2159b13a35fa5d74eaf0