GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F exit=-EPERM'

Information

If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.

Solution

Edit the audit.rules file and add the following line(s) to enable auditing of failed attempts to access files and programs:

either:
-a exit,always -F arch=<ARCH> -S creat -F success=0

or both:
-a exit,always -F arch=<ARCH> -S creat -F exit=-EPERM
-a exit,always -F arch=<ARCH> -S creat -F exit=-EACCES

Restart the auditd service.
# service auditd restart

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

References: 800-53|AU-2d., 800-53|CM-6b., CAT|II, CCI|CCI-000126, CCI|CCI-000366, Rule-ID|SV-218386r603259_rule, STIG-ID|GEN002720, STIG-Legacy|SV-64247, STIG-Legacy|V-814, Vuln-ID|V-218386

Plugin: Unix

Control ID: 7033e537e4398dc3d987c2cecf27dce1b34c33e42baab7b7e330e00ebf576290