GEN002660 - Auditing must be implemented.

Information

Without auditing, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account.

Solution

Use SMIT or command line to enable auditing on the system.
# audit start
Additionally, make sure auditing subsystem starts on system startup.
# mkitab -i cron 'audit:2:once:/usr/sbin/audit start 2>&1 > /dev/console'

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12a., CAT|II, CCI|CCI-000169, Rule-ID|SV-38946r1_rule, STIG-ID|GEN002660, Vuln-ID|V-811

Plugin: Unix

Control ID: 13619b9cb94550e99d1cc197e36ee4ee15c907d9bfdaf5192a09fc462da03829