GEN000000-SOL00040 - The /etc/security/audit_user file must not define a different auditing level for specific users.

Information

The audit_user file may be used to selectively audit more, or fewer, auditing features for specific individuals. If used this way it could subject the activity to a lawsuit and could cause the loss of valuable auditing data in the case of a system compromise. If an item is audited for one individual (other than for root and administrative users - who have more auditing features) it must be audited for all.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the audit_user file and remove specific user configurations differing from the global audit settings.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R4_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-226406r603265_rule, STIG-ID|GEN000000-SOL00040, STIG-Legacy|SV-4353, STIG-Legacy|V-4353, Vuln-ID|V-226406

Plugin: Unix

Control ID: f17078b862f42f07b0aa7c1058a9df071417eead4dffe97764f761af69e30ada