STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The audit system must be configured to audit all attempts to alter system time through stime.

DISA Rule

SV-208884r603263_rule

Vulnerability Number

V-208884

Group Title

SRG-OS-000062

Rule Version

OL6-00-000169

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

On a 32-bit system, add the following to "/etc/audit/audit.rules":

# audit_time_rules
-a always,exit -F arch=b32 -S stime -k audit_time_rules

Note: On a 64-bit system, it is not necessary to define a rule for "stime".

Check Contents

If the system is 64-bit only, this is not applicable.

To determine if the system is configured to audit calls to the "stime" system call, run the following command:

$ sudo grep -w "stime" /etc/audit/audit.rules
-a always,exit -F arch=b32 -S stime -k audit_time_rules

If the system is not configured to audit the "stime" system call, this is a finding.

Vulnerability Number

V-208884

Documentable

False

Rule Version

OL6-00-000169

Severity Override Guidance

If the system is 64-bit only, this is not applicable.

To determine if the system is configured to audit calls to the "stime" system call, run the following command:

$ sudo grep -w "stime" /etc/audit/audit.rules
-a always,exit -F arch=b32 -S stime -k audit_time_rules

If the system is not configured to audit the "stime" system call, this is a finding.

Check Content Reference

M

Target Key

2928

Comments