GEN002740 - The audit system must be configured to audit files and programs deleted by the user - '/etc/audit/audit.rules unlink'

Information

If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.

Solution

Edit the audit.rules file and add the following line to enable auditing of deletions:

-a exit,always -F arch=<ARCH> -S unlink

Restart the auditd service.
# service auditd restart

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R17_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CAT|II, CCI|CCI-000126, Group-ID|V-815, Rule-ID|SV-42185r3_rule, STIG-ID|GEN002740

Plugin: Unix

Control ID: 709960f5a45ce277b1294d6d316f91ae80815d5285ab91b745ef67243162d60a