4.1.16 Ensure system administrator actions (sudolog) are collected

Information

Changes in /var/log/sudo.log indicate that an administrator has executed a command or the log file itself has been tampered with. Administrators will want to correlate the events written to the audit trail with the records written to /var/log/sudo.log to verify if unauthorized commands have been executed.

Solution

Add the following lines to the /etc/audit/audit.rules file:
-w /var/log/sudo.log -p wa -k actions

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CSCv6|5.1, CSCv6|5.5

Plugin: Unix

Control ID: c60152437c6494463651196c7041a821c5cb18a64ee2668928e01d80f066fe8c