AOSX-11-000295 - The system must allocate audit record storage capacity to store at least one weeks worth of audit records.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The audit service must be configured to require that records are kept for 7 days or longer before deletion when there is no central audit record storage facility. When "expire-after" is set to "7d", the audit service will not delete audit logs until the log data is at least 7 days old.

Solution

Edit the /etc/security/audit_control file, and change the value for 'expire-after' to the amount of time audit logs should be kept for the system. Use the following command to set the "expire-after" value to "7d":

/usr/bin/sudo /usr/bin/sed -i.bak 's/.*expire-after.*/expire-after:7d/' /etc/security/audit_control; /usr/bin/sudo /usr/sbin/audit -s

A text editor may also be used to implement the required updates to the /etc/security/audit_control file.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apple_OS_X_10-11_V1R6_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4, CAT|II, CCI|CCI-001849, CSCv6|6.3, Rule-ID|SV-82007r1_rule, STIG-ID|AOSX-11-000295, Vuln-ID|V-67517

Plugin: Unix

Control ID: 9e4dab0f94efd1c914c8a4140a21d91f874f0cb04addee34ac176288b6e19d5b