STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize audit system must be configured to audit all attempts to alter system time through adjtimex.

DISA Rule

SV-99045r1_rule

Vulnerability Number

V-88395

Group Title

SRG-OS-000062-GPOS-00031

Rule Version

VROM-SL-000180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Run the following command:

echo '-a exit,always -F arch=b64 -S adjtimex -F auid=0' >> /etc/audit/audit.rules
echo '-a exit,always -F arch=b64 -S adjtimex -F auid>=500 -F auid!=4294967295' >> /etc/audit/audit.rules

Or run the following command to implement all logging requirements:

# /etc/dodscript.sh

Check Contents

Check if SLES for vRealize system is configured to audit calls to the "adjtimex" system call, run the following command:

# grep -w "adjtimex" /etc/audit/audit.rules

If SLES for vRealize is configured to audit time changes, it will return at least two lines containing "-S adjtimex" that also contain "arch=b64". If no line is returned, this is a finding.

Vulnerability Number

V-88395

Documentable

False

Rule Version

VROM-SL-000180

Severity Override Guidance

Check if SLES for vRealize system is configured to audit calls to the "adjtimex" system call, run the following command:

# grep -w "adjtimex" /etc/audit/audit.rules

If SLES for vRealize is configured to audit time changes, it will return at least two lines containing "-S adjtimex" that also contain "arch=b64". If no line is returned, this is a finding.

Check Content Reference

M

Target Key

3461

Comments