UBTU-18-010006 - The Ubuntu operating system must immediately notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If security personnel are not notified immediately when storage volume reaches 75% utilization, they are unable to plan for audit record storage capacity expansion.

Solution

Edit /etc/audit/auditd.conf and set the space_left_action parameter to 'exec' or 'email'.

If the space_left_action parameter is set to 'email' set the action_mail_acct parameter to an e-mail address for the System Administrator (SA) and Information System Security Officer (ISSO).

If the space_left_action parameter is set to 'exec', make sure the command being execute notifies the System Administrator (SA) and Information System Security Officer (ISSO).

Edit /etc/audit/auditd.conf and set the space_left parameter to be, at least, 25% of the repository maximum audit record storage capacity.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_18-04_LTS_V2R14_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001855, Rule-ID|SV-219152r877389_rule, STIG-ID|UBTU-18-010006, STIG-Legacy|SV-109633, STIG-Legacy|V-100529, Vuln-ID|V-219152

Plugin: Unix

Control ID: 6e08b9dddc5b5f18ee12cfc6a456d8ec6a16673b22fd04d3e19c60beef22a661