PHTN-67-000018 - The Photon operating system must have the auditd service running.

Information

Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. To that end, the auditd service must be configured to start automatically and be running at all times.

Satisfies: SRG-OS-000062-GPOS-00031, SRG-OS-000042-GPOS-00021, SRG-OS-000255-GPOS-00096, SRG-OS-000363-GPOS-00150, SRG-OS-000365-GPOS-00152, SRG-OS-000445-GPOS-00199, SRG-OS-000446-GPOS-00200, SRG-OS-000461-GPOS-00205, SRG-OS-000465-GPOS-00209, SRG-OS-000467-GPOS-00211, SRG-OS-000474-GPOS-00219, SRG-OS-000475-GPOS-00220

Solution

At the command line, execute the following command:

# systemctl enable auditd.service
# service auditd start

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y23M07_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-3, 800-53|AU-3(1), 800-53|AU-12a., 800-53|AU-12c., 800-53|CM-3(5), 800-53|CM-5(1), 800-53|SI-6a., 800-53|SI-6b., CAT|II, CCI|CCI-000135, CCI|CCI-000169, CCI|CCI-000172, CCI|CCI-001487, CCI|CCI-001744, CCI|CCI-001814, CCI|CCI-002696, CCI|CCI-002699, Rule-ID|SV-239090r856039_rule, STIG-ID|PHTN-67-000018, Vuln-ID|V-239090

Plugin: Unix

Control ID: 3f11903cc8cb9964121b321fd41ff9fa7407de788b610b9ea042fbb3e86d405b