STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must generate audit records when successful/unsuccessful attempts to access privileges occur. The SLES for vRealize must generate audit records for all discretionary access control permission modifications using lchown.

DISA Rule

SV-100201r1_rule

Vulnerability Number

V-89551

Group Title

SRG-OS-000064-GPOS-00033

Rule Version

VRAU-SL-000295

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At a minimum, the SLES for vRealize audit system should collect file permission changes for all users and "root". Add the following to "/etc/audit/audit.rules":

-a always,exit -F arch=b64 -S lchown

Or run the following command to implement all logging requirements:

# /etc/dodscript.sh

Check Contents

To determine if the system is configured to audit calls to the "lchown" system call, run the following command:

# auditctl -l | grep syscall | grep lchown

If the system is configured to audit this activity, it will return several lines, such as:

LIST_RULES: exit,always arch=3221225534 (0xc000003e) syscall=lchown,sethostname,init_module,delete_module,setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr,clock_settime

If no lines are returned, this is a finding.

Vulnerability Number

V-89551

Documentable

False

Rule Version

VRAU-SL-000295

Severity Override Guidance

To determine if the system is configured to audit calls to the "lchown" system call, run the following command:

# auditctl -l | grep syscall | grep lchown

If the system is configured to audit this activity, it will return several lines, such as:

LIST_RULES: exit,always arch=3221225534 (0xc000003e) syscall=lchown,sethostname,init_module,delete_module,setxattr,lsetxattr,fsetxattr,removexattr,lremovexattr,fremovexattr,clock_settime

If no lines are returned, this is a finding.

Check Content Reference

M

Target Key

3459

Comments