OL6-00-000525 - Auditing must be enabled at boot by setting a kernel parameter.

Information

Each process on the system carries an 'auditable' flag which indicates whether its activities can be audited. Although 'auditd' takes care of enabling this for all processes which launch after it does, adding the kernel argument ensures it is set for every process during boot.

Solution

To ensure all processes can be audited, even those which start prior to the audit daemon, add the argument 'audit=1' to the kernel line in '/boot/grub/grub.conf', in the manner below:

kernel /vmlinuz-version ro vga=ext root=/dev/VolGroup00/LogVol00 rhgb quiet audit=1

UEFI systems may prepend '/boot' to the '/vmlinuz-version' argument.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V1R18_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-14(1), 800-53|SI-7(9), CAT|III, CCI|CCI-000169, Group-ID|V-50517, Rule-ID|SV-209068r603263_rule, STIG-ID|OL6-00-000525, STIG-Legacy|SV-64723, STIG-Legacy|V-50517, Vuln-ID|V-209068

Plugin: Unix

Control ID: c607236e2e5a57c7bf6b4db47692af059ffee6e196c20f81761c05196883a3eb