UCF STIG Viewer Logo

The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38673 RHEL-06-000307 SV-50474r2_rule Medium
Description
By default, AIDE does not install itself for periodic execution. Periodically running AIDE may reveal unexpected changes in installed files.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2015-05-26

Details

Check Text ( C-46232r2_chk )
To determine that periodic AIDE execution has been scheduled, run the following command:

# grep aide /etc/crontab /etc/cron.*/*

If there is no output, this is a finding.
Fix Text (F-43621r1_fix)
AIDE should be executed on a periodic basis to check for changes. To implement a daily execution of AIDE at 4:05am using cron, add the following line to /etc/crontab:

05 4 * * * root /usr/sbin/aide --check

AIDE can be executed periodically through other means; this is merely one example.