1.133 UBTU-22-654010

Information

The operating system must generate audit records for successful/unsuccessful uses of the apparmor_parser command.

GROUP ID: V-260604
RULE ID: SV-260604r958446

Solution

Configure the audit system to generate an audit event for any successful/unsuccessful use of the "apparmor_parser" command.

Add or modify the following line in the "/etc/audit/rules.d/stig.rules" file:

-a always,exit -F path=/sbin/apparmor_parser -F perm=x -F auid>=1000 -F auid!=unset -k perm_chng

To reload the rules file, issue the following command:

$ sudo augenrules --load

Note: The "-k " at the end of the line gives the rule a unique meaning to help during an audit investigation. The does not need to match the example above.

See Also

https://workbench.cisecurity.org/benchmarks/22168

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, CSCv7|5.5, Rule-ID|SV-260604r958446_rule, STIG-ID|UBTU-22-654010, Vuln-ID|V-260604

Plugin: Unix

Control ID: a562067f84d40b50cd43375182d8b7260828fa15695063e951d63913c24e5aa4