OSX00145 - Configure security auditing

Information

Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions and analyze compromises that have occurred as well as detect an attack that has begun or is about to begin. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Without an audit trail that provides information as to event that occurred and if it was successful or unsuccessful, it is difficult to analyze a series of events to determine the steps used by an attacker to compromise a system or network, or what exactly happened that led to a denial of service. Collecting data such as the successful and unsuccessful events is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior.

Solution

1. Install the Common Criteria Tools for OS X 10.5.
2. Open a terminal session and edit the /etc/security/audit_control file.
3. Find the line that begins with 'flags'.
4. Replace that line with the following- flags-lo,ad,-all,-fr,fd,fm,^-fa,^-fc,^-cl.
5. Save the file

See Also

http://iase.disa.mil/stigs/os/mac/u_mac_osx10.5_v1r2_stig_20110729.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CAT|II, Rule-ID|SV-31335r3_rule, STIG-ID|OSX00145, Vuln-ID|V-25269

Plugin: Unix

Control ID: 34da9324509853975f7f5f31b78df60332654968b4990f8c576f4ba1f5b80dfc