4.1.3.26 Ensure audit of the rmdir syscall - 32 bit

Information

The operating system must audit all uses of the rmdir syscall.

Rationale:

If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.

Solution

Configure the operating system to generate audit records when successful/unsuccessful attempts to use the rmdir syscall occur.
Add the following rules in /etc/audit/rules.d/audit.rules:
Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured.
Example: vim /etc/audit/rules.d/audit.rules
Add, uncomment or update the following line that fits your system architecture:

-a always,exit -F arch=b32 -S rmdir -F auid>=1000 -F auid!=4294967295 -k delete

-a always,exit -F arch=b64 -S rmdir -F auid>=1000 -F auid!=4294967295 -k delete

The audit daemon must be restarted for the changes to take effect.

# service auditd restart

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: AUDIT AND ACCOUNTABILITY, MAINTENANCE

References: 800-53|AU-12c., 800-53|MA-4(1)(a), CCI|CCI-000172, CCI|CCI-002884, CSCv7|6.2, Rule-ID|SV-204571r603261_rule, STIG-ID|RHEL-07-030900

Plugin: Unix

Control ID: 1d3ff4be0fe9f15a753985ab0d3c5b1cc6a55cd817cef7a311a6a39dc1591066