PHTN-40-000237 The Photon operating system must configure AIDE to detect changes to baseline configurations.

Information

Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the operating system. Changes to operating system configurations can have unintended side effects, some of which may be relevant to security.

Detecting such changes and providing an automated response can help avoid unintended, negative consequences that could ultimately affect the security state of the operating system. The operating system's information system security manager (ISSM)/information system security officer (ISSO) and system administrators (SAs) must be notified via email and/or monitoring system trap when there is an unauthorized modification of a configuration item.

Solution

Update the /etc/aide.conf file with the template provided as a supplemental document.

At the command line, run the following commands to generate an AIDE database to use for file monitoring:

# aide --init
# cp /var/lib/aide/aide.db.new.gz /var/lib/aide/aide.db.gz

Note: It is recommended to run these fix steps after all other STIG configurations have been completed so that the AIDE database includes those updates.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-3(5), CAT|II, CCI|CCI-001744, Rule-ID|SV-266062r1003658_rule, STIG-ID|PHTN-40-000237, Vuln-ID|V-266062

Plugin: Unix

Control ID: 57a16add4b947054eb6f720f2bcdfca95d40170d317d29f891d05edbfaf2bd75