STIGQter STIGQter: STIG Summary: SUSE Linux Enterprise Server 15 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.

DISA Rule

SV-234904r622137_rule

Vulnerability Number

V-234904

Group Title

SRG-OS-000037-GPOS-00015

Rule Version

SLES-15-030050

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Enable the SUSE operating system auditd service by performing the following commands:

> sudo systemctl enable auditd.service
> sudo systemctl start auditd.service

Check Contents

Verify the SUSE operating system produces audit records.

Check that the SUSE operating system produces audit records by running the following command to determine the current status of the auditd service:

> systemctl is-active auditd.service
active

> systemctl is-enabled auditd.service
enabled

If the service is not active or not enabled, this is a finding.

Vulnerability Number

V-234904

Documentable

False

Rule Version

SLES-15-030050

Severity Override Guidance

Verify the SUSE operating system produces audit records.

Check that the SUSE operating system produces audit records by running the following command to determine the current status of the auditd service:

> systemctl is-active auditd.service
active

> systemctl is-enabled auditd.service
enabled

If the service is not active or not enabled, this is a finding.

Check Content Reference

M

Target Key

5274

Comments