STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize audit system must be configured to audit all attempts to alter system time through /etc/localtime.

DISA Rule

SV-99053r1_rule

Vulnerability Number

V-88403

Group Title

SRG-OS-000062-GPOS-00031

Rule Version

VROM-SL-000200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To configure the SLES for vRealize to audit attempts to alter time via the /etc/localtime file, run the following command:

echo '-w /etc/localtime -p wa -k localtime' >> /etc/audit/audit.rules

Or run the following command to implement all logging requirements:

# /etc/dodscript.sh

Check Contents

To determine if SLES for vRealize is configured to audit attempts to alter time via the /etc/localtime file, run the following command:

# auditctl -l | grep "watch=/etc/localtime"

If SLES for vRealize is configured to audit this activity, it will return a line.

LIST_RULES: exit,always watch=/etc/localtime perm=wa key=localtime

If no line is returned, this is a finding.

Vulnerability Number

V-88403

Documentable

False

Rule Version

VROM-SL-000200

Severity Override Guidance

To determine if SLES for vRealize is configured to audit attempts to alter time via the /etc/localtime file, run the following command:

# auditctl -l | grep "watch=/etc/localtime"

If SLES for vRealize is configured to audit this activity, it will return a line.

LIST_RULES: exit,always watch=/etc/localtime perm=wa key=localtime

If no line is returned, this is a finding.

Check Content Reference

M

Target Key

3461

Comments