STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize audit system must be configured to audit failed attempts to access files and programs.

DISA Rule

SV-100495r1_rule

Vulnerability Number

V-89845

Group Title

SRG-OS-000474-GPOS-00219

Rule Version

VRAU-SL-001440

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the audit.rules file and add the following line(s) to enable auditing of failed attempts to access files and programs:

-a exit,always -F arch=b64 -S open -F exit=-EPERM
-a exit,always -F arch=b64 -S open -F exit=-EACCES
-a exit,always -F arch=b32 -S open -F exit=-EPERM
-a exit,always -F arch=b32 -S open -F exit=-EACCES

Check Contents

Verify auditd is configured to audit failed file access attempts. There must be both an "-F exit=-EPERM" and "-F exit=-EACCES" for each access syscall:

# cat /etc/audit.rules /etc/audit/audit.rules | grep -e "-a exit,always" | grep -e "-S open" | grep -e "-F exit=-EPERM"

# cat /etc/audit.rules /etc/audit/audit.rules | grep -e "-a exit,always" | grep -e "-S open" | grep -e "-F exit=-EACCES"

There must be both an "-F exit=-EPERM" and "-F exit=-EACCES" for each access syscall.

If not, this is a finding.

Vulnerability Number

V-89845

Documentable

False

Rule Version

VRAU-SL-001440

Severity Override Guidance

Verify auditd is configured to audit failed file access attempts. There must be both an "-F exit=-EPERM" and "-F exit=-EACCES" for each access syscall:

# cat /etc/audit.rules /etc/audit/audit.rules | grep -e "-a exit,always" | grep -e "-S open" | grep -e "-F exit=-EPERM"

# cat /etc/audit.rules /etc/audit/audit.rules | grep -e "-a exit,always" | grep -e "-S open" | grep -e "-F exit=-EACCES"

There must be both an "-F exit=-EPERM" and "-F exit=-EACCES" for each access syscall.

If not, this is a finding.

Check Content Reference

M

Target Key

3459

Comments