STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications, any unexpected users, groups, or modifications must be investigated for legitimacy.

DISA Rule

SV-99009r1_rule

Vulnerability Number

V-88359

Group Title

SRG-OS-000004-GPOS-00004

Rule Version

VROM-SL-000020

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure append auditing of the "passwd", "shadow", "group", and "gshadow" files run the DoD.script with the following command as root:

# /etc/dodscript.sh
# echo '-w /etc/gshadow -p a -k gshadow' >> /etc/audit/audit.rules

Restart the auditd service.
# service auditd restart

OR

Configure append auditing of the passwd, shadow, group, and gshadow files by running the following commands:

# echo '-w /etc/passwd -p a -k passwd' >> /etc/audit/audit.rules
# echo '-w /etc/shadow -p a -k shadow' >> /etc/audit/audit.rules
# echo '-w /etc/group -p a -k group' >> /etc/audit/audit.rules
# echo '-w /etc/gshadow -p a -k gshadow' >> /etc/audit/audit.rules

Restart the auditd service.

# service auditd restart

Check Contents

Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited for appending.

# auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' | grep perm=a

If the "passwd", "shadow", "group", and "gshadow" files are not listed with a permissions filter of at least "a", this is a finding.

Expected result:
LIST_RULES: exit,always watch=/etc/passwd perm=a key=passwd
LIST_RULES: exit,always watch=/etc/shadow perm=a key=shadow
LIST_RULES: exit,always watch=/etc/group perm=a key=group
LIST_RULES: exit,always watch=/etc/gshadow perm=a key=gshadow

Vulnerability Number

V-88359

Documentable

False

Rule Version

VROM-SL-000020

Severity Override Guidance

Determine if /etc/passwd, /etc/shadow, /etc/group, and /etc/gshadow are audited for appending.

# auditctl -l | egrep '(/etc/passwd|/etc/shadow|/etc/group|/etc/gshadow)' | grep perm=a

If the "passwd", "shadow", "group", and "gshadow" files are not listed with a permissions filter of at least "a", this is a finding.

Expected result:
LIST_RULES: exit,always watch=/etc/passwd perm=a key=passwd
LIST_RULES: exit,always watch=/etc/shadow perm=a key=shadow
LIST_RULES: exit,always watch=/etc/group perm=a key=group
LIST_RULES: exit,always watch=/etc/gshadow perm=a key=gshadow

Check Content Reference

M

Target Key

3461

Comments