4.1.3 Ensure auditing for processes that start prior to auditd is enabled - /etc/default/grub

Information

Audit events need to be captured on processes that start up prior to auditd, so that potential malicious activity cannot go undetected.

Solution

For grub2 based systems edit /etc/default/grub and add audit=1 to GRUB_CMDLINE_LINUX:
GRUB_CMDLINE_LINUX='audit=1'

Run the following command to update the grub2 configuration:
# update-grub

See Also

https://workbench.cisecurity.org/files/1856

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-14, 800-53|SI-7, CSCv6|6.2

Plugin: Unix

Control ID: 931cc655ba5bad9fbb94a87ac0178b895c58fdf5a2a427d84dbea393140e3720