SV-239127r675189_rule
V-239127
SRG-OS-000327-GPOS-00127
PHTN-67-000056
CAT II
10
At the command line, execute the following command to obtain a list of setuid files:
# find / -xdev -perm -4000 -type f -o -perm -2000 -type f
Execute the following command for each setuid file found in the first command that does not have a corresponding line in the audit rules:
# echo '-a always,exit -F path=<setuid_path> -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged' >> /etc/audit/rules.d/audit.STIG.rules
Replace <setuid_path> with each path found in the first command.
Execute the following command to load the new rules:
# /sbin/augenrules --load
At the command line, execute the following command to obtain a list of setuid files:
# find / -xdev -perm -4000 -type f -o -perm -2000 -type f
Execute the following command for each setuid file found in the first command:
# grep <setuid_path> /etc/audit/audit.rules
Replace <setuid_path> with each path found in the first command.
If each <setuid_path> does not have a corresponding line in the audit rules, this is a finding.
A typical corresponding line will look like the following:
-a always,exit -F path=<setuid_path> -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged
V-239127
False
PHTN-67-000056
At the command line, execute the following command to obtain a list of setuid files:
# find / -xdev -perm -4000 -type f -o -perm -2000 -type f
Execute the following command for each setuid file found in the first command:
# grep <setuid_path> /etc/audit/audit.rules
Replace <setuid_path> with each path found in the first command.
If each <setuid_path> does not have a corresponding line in the audit rules, this is a finding.
A typical corresponding line will look like the following:
-a always,exit -F path=<setuid_path> -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged
M
5323