UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux).


Overview

Finding ID Version Rule ID IA Controls Severity
V-38541 RHEL-06-000183 SV-50342r2_rule Low
Description
The system's mandatory access policy (SELinux) should not be arbitrarily changed by anything other than administrator action. All changes to MAC policy should be audited.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2018-11-28

Details

Check Text ( C-46099r3_chk )
To determine if the system is configured to audit changes to its SELinux configuration files, run the following command:

$ sudo grep -w "/etc/selinux" /etc/audit/audit.rules

If the system is configured to watch for changes to its SELinux configuration, a line should be returned (including "-p wa" indicating permissions that are watched).

If the system is not configured to audit attempts to change the MAC policy, this is a finding.
Fix Text (F-43489r1_fix)
Add the following to "/etc/audit/audit.rules":

-w /etc/selinux/ -p wa -k MAC-policy