SV-234938r622137_rule
V-234938
SRG-OS-000037-GPOS-00015
SLES-15-030390
CAT II
10
Configure the SUSE operating system to audit the execution of the module management program "rmmod" by adding the following line to "/etc/audit/rules.d/audit.rules":
-w /sbin/rmmod -p x -k modules
To reload the rules file, restart the audit daemon
> sudo systemctl restart auditd.service
or issue the following command:
> sudo augenrules --load
Verify the SUSE operating system generates an audit record for all uses of the "rmmod" command.
Check that the command is being audited by performing the following command:
> sudo auditctl -l | grep -w '/sbin/rmmod'
-w /sbin/rmmod -p x -k modules
If the system is configured to audit the execution of the module management program "rmmod", the command will return a line.
If the command does not return a line, this is a finding.
Note:
The "-k" allows for specifying an arbitrary identifier. The string following "-k" does not need to match the example output above.
V-234938
False
SLES-15-030390
Verify the SUSE operating system generates an audit record for all uses of the "rmmod" command.
Check that the command is being audited by performing the following command:
> sudo auditctl -l | grep -w '/sbin/rmmod'
-w /sbin/rmmod -p x -k modules
If the system is configured to audit the execution of the module management program "rmmod", the command will return a line.
If the command does not return a line, this is a finding.
Note:
The "-k" allows for specifying an arbitrary identifier. The string following "-k" does not need to match the example output above.
M
5274