STIGQter STIGQter: STIG Summary: Oracle Linux 7 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Oracle Linux operating system must generate audit records for all unsuccessful account access events.

DISA Rule

SV-221801r603260_rule

Vulnerability Number

V-221801

Group Title

SRG-OS-000392-GPOS-00172

Rule Version

OL07-00-030610

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the operating system to generate audit records when unsuccessful account access events occur.

Add or update the following rule in "/etc/audit/rules.d/audit.rules":

-w /var/run/faillock -p wa -k logins

The audit daemon must be restarted for the changes to take effect.

Check Contents

Verify the operating system generates audit records when unsuccessful account access events occur.

Check the file system rule in "/etc/audit/audit.rules" with the following commands:

# grep -i /var/run/faillock /etc/audit/audit.rules

-w /var/run/faillock -p wa -k logins

If the command does not return any output, this is a finding.

Vulnerability Number

V-221801

Documentable

False

Rule Version

OL07-00-030610

Severity Override Guidance

Verify the operating system generates audit records when unsuccessful account access events occur.

Check the file system rule in "/etc/audit/audit.rules" with the following commands:

# grep -i /var/run/faillock /etc/audit/audit.rules

-w /var/run/faillock -p wa -k logins

If the command does not return any output, this is a finding.

Check Content Reference

M

Target Key

4089

Comments