7.1.3 Ensure modification to TE system is audited

Information

At Level 1, Trusted Execution (TE) should be actively monitoring for applications not yet allowlisted.The recommendation for this is in section two.

Additionally, the AIX AUDIT system needs to be configured for modifications to the TE subsystem.

Modification to security mechanisms need to be monitored to maintain system integrity.

Solution

- Ensure AUDIT Trusted Execution events are in the class default.

- Edit the file /var/security/audit/config
- Find the stanza named classes:
- If the class default does not exist add a line with:

default = TE_Untrusted,TE_FileWrite,TE_Policies,TEAdd_Stnz,TEDel_Stnz,TESwitch_algo,TEQuery_Stnz <xhtml:ol start="4"> - If the class default already exists ensure the following audit events are included in the class definition

TE_Untrusted,TE_FileWrite,TE_Policies,TEAdd_Stnz,TEDel_Stnz,TESwitch_algo,TEQuery_Stnz

See Also

https://workbench.cisecurity.org/benchmarks/19066

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-3, 800-53|AU-3(1), 800-53|AU-7, 800-53|AU-12, CSCv7|6.2

Plugin: Unix

Control ID: 20579ef77f30c951eee8ffb26f147e12b13b8eacd1100ab0521a2bafc30ee075