STIGQter STIGQter: STIG Summary: VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must generate audit records showing starting and ending time for user access to the system.

DISA Rule

SV-99377r1_rule

Vulnerability Number

V-88727

Group Title

SRG-OS-000472-GPOS-00217

Rule Version

VROM-SL-001395

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure the auditing of logins by modifying the "/etc/audit/audit.rules" file to contain:

-w /var/log/faillog -p wa
-w /var/log/lastlog -p wa
-w /var/log/tallylog -p wa

OR

# /etc/dodscript.sh

Check Contents

The message types that are always recorded to the "/var/log/audit/audit.log" file include "LOGIN", "USER_LOGIN", "USER_START", "USER_END" among others and do not need to be added to audit.rules.

The log files "/var/log/faillog", "/var/log/lastlog", and "/var/log/tallylog" must be protected from tampering of the login records:

# egrep "faillog|lastlog|tallylog" /etc/audit/audit.rules

If "/var/log/faillog", "/var/log/lastlog", and "/var/log/tallylog" entries do not exist, this is a finding.

Vulnerability Number

V-88727

Documentable

False

Rule Version

VROM-SL-001395

Severity Override Guidance

The message types that are always recorded to the "/var/log/audit/audit.log" file include "LOGIN", "USER_LOGIN", "USER_START", "USER_END" among others and do not need to be added to audit.rules.

The log files "/var/log/faillog", "/var/log/lastlog", and "/var/log/tallylog" must be protected from tampering of the login records:

# egrep "faillog|lastlog|tallylog" /etc/audit/audit.rules

If "/var/log/faillog", "/var/log/lastlog", and "/var/log/tallylog" entries do not exist, this is a finding.

Check Content Reference

M

Target Key

3461

Comments