AIX must produce audit records containing the full-text recording of privileged commands.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-215240 | AIX7-00-002006 | SV-215240r958422_rule | CCI-000135 | medium |
| Description | ||||
| Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise. | ||||
| STIG | Date | |||
| IBM AIX 7.x Security Technical Implementation Guide | 2024-08-16 | |||
Details
Check Text (C-215240r958422_chk)
Verify the audit daemon is configured for full-text recording of privileged commands:
The log file can be set by the "trail" variable in /etc/security/audit/config.
# grep trail /etc/security/audit/config
trail = /audit/trail
Note: The default log file is /audit/trail.
Use the following command to display the audit events:
# /usr/sbin/auditpr -i <audit log file> -v
event login status time command
wpar name
--------------- -------- ----------- ------------------------ ------------------
------------- -------------------------
S_PASSWD_READ root OK Sat Aug 26 19:35:00 2017 cron
Global
audit object read event detected /etc/security/passwd
S_PASSWD_READ root OK Sat Aug 26 19:35:00 2017 cron
Global
audit object read event detected /etc/security/passwd
CRON_Start root OK Sat Aug 26 19:35:00 2017 cron
Global
event = start cron job cmd = /usr/sbin/dumpctrl -k >/dev/null 2>/dev/nul
l time = Sat Aug 26 19:35:00 2017
FS_Chdir root OK Sat Aug 26 19:35:00 2017 cron
Global
change current directory to: /
If the full-text recording of privileged command is not displayed, this is a finding.
More information on the command options used above:
- v detailed information for the event
Fix Text (F-16436r294172_fix)
Reset the audit system with the following command:
# /usr/sbin/audit shutdown
Start the audit system with the following command:
# /usr/sbin/audit start