STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 7 Security Technical Implementation Guide Version: 3 Release: 3 Benchmark Date: 23 Apr 2021:

The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.

DISA Rule

SV-204495r603261_rule

Vulnerability Number

V-204495

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

RHEL-07-021330

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Migrate the system audit data path onto a separate file system.

Check Contents

Determine if the operating system is configured to have the "/var/log/audit" path is on a separate file system.

# grep /var/log/audit /etc/fstab

If no result is returned, or the operating system is not configured to have "/var/log/audit" on a separate file system, this is a finding.

Verify that "/var/log/audit" is mounted on a separate file system:

# mount | grep "/var/log/audit"

If no result is returned, or "/var/log/audit" is not on a separate file system, this is a finding.

Vulnerability Number

V-204495

Documentable

False

Rule Version

RHEL-07-021330

Severity Override Guidance

Determine if the operating system is configured to have the "/var/log/audit" path is on a separate file system.

# grep /var/log/audit /etc/fstab

If no result is returned, or the operating system is not configured to have "/var/log/audit" on a separate file system, this is a finding.

Verify that "/var/log/audit" is mounted on a separate file system:

# mount | grep "/var/log/audit"

If no result is returned, or "/var/log/audit" is not on a separate file system, this is a finding.

Check Content Reference

M

Target Key

2899

Comments