STIGQter STIGQter: STIG Summary: Canonical Ubuntu 16.04 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020: The Ubuntu operating system must use a separate file system for the system audit data path.

DISA Rule

SV-90271r1_rule

Vulnerability Number

V-75591

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

UBTU-16-010930

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Migrate the system audit data path onto a separate file system.

Check Contents

Verify that a separate file system/partition has been created for the system audit data path.

Check that a file system/partition has been created for the system audit data path with the following command:

Note: /var/log/audit is used as the example as it is a common location.

#grep /var/log/audit /etc/fstab
UUID=3645951a /var/log/audit ext4 defaults 1 2

If a separate entry for "/var/log/audit" does not exist, ask the System Administrator if the system audit logs are being written to a different file system/partition on the system, then grep for that file system/partition.

If a separate file system/partition does not exist for the system audit data path, this is a finding.

Vulnerability Number

V-75591

Documentable

False

Rule Version

UBTU-16-010930

Severity Override Guidance

Verify that a separate file system/partition has been created for the system audit data path.

Check that a file system/partition has been created for the system audit data path with the following command:

Note: /var/log/audit is used as the example as it is a common location.

#grep /var/log/audit /etc/fstab
UUID=3645951a /var/log/audit ext4 defaults 1 2

If a separate entry for "/var/log/audit" does not exist, ask the System Administrator if the system audit logs are being written to a different file system/partition on the system, then grep for that file system/partition.

If a separate file system/partition does not exist for the system audit data path, this is a finding.

Check Content Reference

M

Target Key

3075

Comments