STIGQter STIGQter: STIG Summary: SUSE Linux Enterprise Server 15 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The audit-audispd-plugins must be installed on the SUSE operating system.

DISA Rule

SV-234966r622137_rule

Vulnerability Number

V-234966

Group Title

SRG-OS-000342-GPOS-00133

Rule Version

SLES-15-030670

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Install the "audit-audispd-plugins" package on the SUSE operating system by running the following command:

> sudo zypper install audit-audispd-plugins

In "/etc/audisp/plugins.d/au-remote.conf", change the value of "active" to "yes", or add "active = yes" if no such setting exists in the file.

Check Contents

Verify that the "audit-audispd-plugins" package is installed on the SUSE operating system.

Check that the "audit-audispd-plugins" package is installed on the SUSE operating system with the following command:

> zypper info audit-audispd-plugins | grep Installed

If the "audit-audispd-plugins" package is not installed, this is a finding.

Verify the "au-remote" plugin is enabled with the following command:

> sudo grep -i active /etc/audisp/plugins.d/au-remote.conf
active = yes

If "active" is missing, commented out, or is not set to "yes", this is a finding.

Vulnerability Number

V-234966

Documentable

False

Rule Version

SLES-15-030670

Severity Override Guidance

Verify that the "audit-audispd-plugins" package is installed on the SUSE operating system.

Check that the "audit-audispd-plugins" package is installed on the SUSE operating system with the following command:

> zypper info audit-audispd-plugins | grep Installed

If the "audit-audispd-plugins" package is not installed, this is a finding.

Verify the "au-remote" plugin is enabled with the following command:

> sudo grep -i active /etc/audisp/plugins.d/au-remote.conf
active = yes

If "active" is missing, commented out, or is not set to "yes", this is a finding.

Check Content Reference

M

Target Key

5274

Comments