UCF STIG Viewer Logo

The audit system must be configured to audit changes to the /etc/sudoers file.


Finding ID Version Rule ID IA Controls Severity
V-217979 RHEL-06-000201 SV-217979r505923_rule Low
The actions taken by system administrators should be audited to keep a record of what was executed on the system, as well as, for accountability purposes.
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2020-09-03


Check Text ( C-19460r376952_chk )
To verify that auditing is configured for system administrator actions, run the following command:

$ sudo grep -w "/etc/sudoers" /etc/audit/audit.rules

If the system is configured to watch for changes to its sudoers configuration, a line should be returned (including "-p wa" indicating permissions that are watched).

If there is no output, this is a finding.
Fix Text (F-19458r376953_fix)
At a minimum, the audit system should collect administrator actions for all users and root. Add the following to "/etc/audit/audit.rules":

-w /etc/sudoers -p wa -k actions