4.1.3 Ensure auditing for processes that start prior to auditd is enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Configure grub so that processes that are capable of being audited can be audited even if they start up prior to auditdstartup.
Rationale:
Audit events need to be captured on processes that start up prior to auditd, so that potential malicious activity cannot go undetected.

Solution

Edit /etc/default/grub and add audit=1 to GRUB_CMDLINE_LINUX:
GRUB_CMDLINE_LINUX="audit=1"
Run the following command to update the grub2 configuration:
# update-grub
Notes:
This recommendation is designed around the grub bootloader, if LILO or another bootloader is in use in your environment enact equivalent settings.

See Also

https://workbench.cisecurity.org/files/2429

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7(9), CSCv6|6.2, CSCv7|6.2, CSCv7|6.3

Plugin: Unix

Control ID: 1581fac0e7ff95c20c105b9eb8d85d9c3ff588943dc117e8e6f65c51166e2af1