SV-215236r508663_rule
V-215236
SRG-OS-000037-GPOS-00015
AIX7-00-002001
CAT II
10
Reset the audit system with the following command:
# /usr/sbin/audit shutdown
Start the audit system with the following command:
# /usr/sbin/audit start
Check if audit is turned on by running the following command:
# audit query | grep -i auditing
auditing on
The command should yield the following output:
auditing on
If the command shows "auditing off", this is a finding.
The log file can be set by the "trail" variable in /etc/security/audit/config.
# grep trail /etc/security/audit/config
trail = /audit/trail
Note: The default log file is "/audit/trail".
Use the following command to display the audit events:
# /usr/sbin/auditpr -i <audit log file> -helRtcp
event login status time command process
--------------- -------- ----------- ------------------------ ------------------------------- --------
PROC_Delete root OK Wed Oct 31 23:01:37 2018 audit 9437656
FILE_Close root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Open root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Read root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Close root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
PROC_Create root OK Wed Oct 31 23:01:44 2018 ksh 12976466
FILE_Close root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Open root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Read root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Close root OK Wed Oct 31 23:01:44 2018 ksh 9437658
PROC_Execute root OK Wed Oct 31 23:01:44 2018 ls 9437658
FILE_Open root OK Wed Oct 31 23:01:44 2018 ls 9437658
If event type is not displayed, this is a finding.
More information on the command options used above:
-e the audit event.
-l the login name of the user.
-R the audit status.
-t the time the record was written.
-c the command name.
-p the process ID.
V-215236
False
AIX7-00-002001
Check if audit is turned on by running the following command:
# audit query | grep -i auditing
auditing on
The command should yield the following output:
auditing on
If the command shows "auditing off", this is a finding.
The log file can be set by the "trail" variable in /etc/security/audit/config.
# grep trail /etc/security/audit/config
trail = /audit/trail
Note: The default log file is "/audit/trail".
Use the following command to display the audit events:
# /usr/sbin/auditpr -i <audit log file> -helRtcp
event login status time command process
--------------- -------- ----------- ------------------------ ------------------------------- --------
PROC_Delete root OK Wed Oct 31 23:01:37 2018 audit 9437656
FILE_Close root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Open root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Read root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
FILE_Close root OK Wed Oct 31 23:01:37 2018 auditbin 12255562
PROC_Create root OK Wed Oct 31 23:01:44 2018 ksh 12976466
FILE_Close root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Open root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Read root OK Wed Oct 31 23:01:44 2018 ksh 9437658
FILE_Close root OK Wed Oct 31 23:01:44 2018 ksh 9437658
PROC_Execute root OK Wed Oct 31 23:01:44 2018 ls 9437658
FILE_Open root OK Wed Oct 31 23:01:44 2018 ls 9437658
If event type is not displayed, this is a finding.
More information on the command options used above:
-e the audit event.
-l the login name of the user.
-R the audit status.
-t the time the record was written.
-c the command name.
-p the process ID.
M
4012