STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize audit system must be configured to audit all attempts to alter system time through /etc/localtime.

DISA Rule

SV-100163r1_rule

Vulnerability Number

V-89513

Group Title

SRG-OS-000062-GPOS-00031

Rule Version

VRAU-SL-000200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To configure the system to audit attempts to alter time via the /etc/localtime file, run the following command:

echo '-w /etc/localtime -p wa -k localtime' >> /etc/audit/audit.rules

Or run the following command to implement all logging requirements:

# /etc/dodscript.sh

Check Contents

To determine if the system is configured to audit attempts to alter time via the /etc/localtime file, run the following command:

# auditctl -l | grep "watch=/etc/localtime"

If the system is configured to audit this activity, it will return.

LIST_RULES: exit,always watch=/etc/localtime perm=wa key=localtime

If no line is returned, this is a finding.

Vulnerability Number

V-89513

Documentable

False

Rule Version

VRAU-SL-000200

Severity Override Guidance

To determine if the system is configured to audit attempts to alter time via the /etc/localtime file, run the following command:

# auditctl -l | grep "watch=/etc/localtime"

If the system is configured to audit this activity, it will return.

LIST_RULES: exit,always watch=/etc/localtime perm=wa key=localtime

If no line is returned, this is a finding.

Check Content Reference

M

Target Key

3459

Comments