SOL-11.1-010360 - The auditing system must not define a different auditing level for specific users.

Information

Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account.

Solution

The root role is required.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is 'global', this action applies.

For each user on the system, remove all special audit configuration flags.

# usermod -K audit_flags= [username]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216270r959010_rule, STIG-ID|SOL-11.1-010360, STIG-Legacy|SV-60705, STIG-Legacy|V-47831, Vuln-ID|V-216270

Plugin: Unix

Control ID: 37d669a7b8785fca0c4757dac9384b0dfd3c6b580ca4a4b56a9189bf650961c1