STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Permissions.

DISA Rule

SV-100179r1_rule

Vulnerability Number

V-89529

Group Title

SRG-OS-000063-GPOS-00032

Rule Version

VRAU-SL-000240

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Change the permissions of the /etc/audit/audit.rules.STIG, the /etc/audit/audit.rules.ORIG, and the /etc/audit/audit.rules files (if not a symblic link):

# chmod 640 /etc/audit/audit.rules.STIG
# chmod 640 /etc/audit/audit.rules.ORIG
# if [ -f /etc/audit/audit.rules ]; then chmod 640 /etc/audit/audit.rules; fi

Or run the following command to implement all logging requirements:

# /etc/dodscript.sh

Check Contents

Check the permissions of the rules files in /etc/audit:

# ls -l /etc/audit/

NOTE: If /etc/audit/audit.rules is a symblic link to /etc/audit/audit.rules.STIG, then the check is only applicable to /etc/audit/audit.rules.STIG.

If the permissions of the file is not set to "640", this is a finding.

Vulnerability Number

V-89529

Documentable

False

Rule Version

VRAU-SL-000240

Severity Override Guidance

Check the permissions of the rules files in /etc/audit:

# ls -l /etc/audit/

NOTE: If /etc/audit/audit.rules is a symblic link to /etc/audit/audit.rules.STIG, then the check is only applicable to /etc/audit/audit.rules.STIG.

If the permissions of the file is not set to "640", this is a finding.

Check Content Reference

M

Target Key

3459

Comments