GEN002825 - System must be configured to audit load/unload dynamic kernel modules

Information

Actions concerning dynamic kernel modules must be recorded as they are substantial events. Dynamic kernel modules can increase the attack surface of a system. A malicious kernel module can be used to substantially alter the functioning of a system, often with the purpose of hiding a compromise from the SA.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Edit /etc/audit/audit_site.conf and add the admin, modload, moduload, and modpath syscalls to the list of events to be audited.

See Also

https://iasecontent.disa.mil/stigs/zip/U_HPUX_11-31_V1R19_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000126, Rule-ID|SV-26525r2_rule, STIG-ID|GEN002825, Vuln-ID|V-22383

Plugin: Unix

Control ID: eae5a0f85b4e6ab1807642aba538d099bfeb52c63cede20c0e4f8e3416a95aa8