STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must audit all account modifications.

DISA Rule

SV-100393r1_rule

Vulnerability Number

V-89743

Group Title

SRG-OS-000239-GPOS-00089

Rule Version

VRAU-SL-000875

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure append auditing of the "passwd", "shadow", "group", and "gshadow" files run "dodscript" with the following command as "root":

# /etc/dodscript.sh

OR

Configure auditing of the "passwd", "shadow", "group", and "gshadow" files. Add the following to the audit.rules file:
-w /etc/passwd -p w -k passwd
-w /etc/shadow -p w -k shadow
-w /etc/group -p w -k group
-w /etc/gshadow -p w -k gshadow

Restart the auditd service:

# service auditd restart

Check Contents

Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited for writing.

# auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' | grep perm=w

If any of these are not listed with a permissions filter of at least "w", this is a finding.

Vulnerability Number

V-89743

Documentable

False

Rule Version

VRAU-SL-000875

Severity Override Guidance

Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited for writing.

# auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' | grep perm=w

If any of these are not listed with a permissions filter of at least "w", this is a finding.

Check Content Reference

M

Target Key

3459

Comments