STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must generate audit records when loading dynamic kernel modules.

DISA Rule

SV-238314r654117_rule

Vulnerability Number

V-238314

Group Title

SRG-OS-000471-GPOS-00216

Rule Version

UBTU-20-010276

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the audit system to generate audit events when adding and deleting kernel modules.

Add or update the following rules in the "/etc/audit/rules.d/stig.rules" file:

always,exit -F arch=b32 -S delete_module -k modules
always,exit -F arch=b64 -S delete_module -k modules

Notes: For 32-bit architectures, only the 32-bit specific entries are required.

To reload the rules file, issue the following command:

$ sudo augenrules --load

Check Contents

Verify the Ubuntu operating system generates an audit record when adding and deleting kernel modules.

Check the currently configured audit rules with the following command:

$ sudo auditctl -l | grep -delete_module

always,exit -F arch=b32 -S delete_module -k modules
always,exit -F arch=b64 -S delete_module -k modules

If the command does not return lines that matches the example or the lines are commented out, this is a finding.

Notes:
- For 32-bit architectures, only the 32-bit specific output lines from the commands are required.
- The "-k" allows for specifying an arbitrary identifier, and the string after it does not need to match the example output above.

Vulnerability Number

V-238314

Documentable

False

Rule Version

UBTU-20-010276

Severity Override Guidance

Verify the Ubuntu operating system generates an audit record when adding and deleting kernel modules.

Check the currently configured audit rules with the following command:

$ sudo auditctl -l | grep -delete_module

always,exit -F arch=b32 -S delete_module -k modules
always,exit -F arch=b64 -S delete_module -k modules

If the command does not return lines that matches the example or the lines are commented out, this is a finding.

Notes:
- For 32-bit architectures, only the 32-bit specific output lines from the commands are required.
- The "-k" allows for specifying an arbitrary identifier, and the string after it does not need to match the example output above.

Check Content Reference

M

Target Key

5318

Comments