UCF STIG Viewer Logo

The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux).


Overview

Finding ID Version Rule ID IA Controls Severity
V-38541 RHEL-06-000183 SV-50342r1_rule Low
Description
The system's mandatory access policy (SELinux) should not be arbitrarily changed by anything other than administrator action. All changes to MAC policy should be audited.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-05-26

Details

Check Text ( C-46099r1_chk )
To determine if the system is configured to audit changes to its SELinux configuration files, run the following command:

# auditctl -l | grep "dir=/etc/selinux"

If the system is configured to watch for changes to its SELinux configuration, a line should be returned (including "perm=wa" indicating permissions that are watched).
If the system is not configured to audit attempts to change the MAC policy, this is a finding.
Fix Text (F-43489r1_fix)
Add the following to "/etc/audit/audit.rules":

-w /etc/selinux/ -p wa -k MAC-policy