OL6-00-000175 - The operating system must automatically audit account modification - '/etc/security/opasswd'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications. Any unexpected users, groups, or modifications should be investigated for legitimacy.

Solution

Add the following to '/etc/audit/audit.rules', in order to capture events that modify account changes:

# audit_account_changes
-w /etc/group -p wa -k audit_account_changes
-w /etc/passwd -p wa -k audit_account_changes
-w /etc/gshadow -p wa -k audit_account_changes
-w /etc/shadow -p wa -k audit_account_changes
-w /etc/security/opasswd -p wa -k audit_account_changes

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R6_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001403, Rule-ID|SV-208888r793673_rule, STIG-ID|OL6-00-000175, STIG-Legacy|SV-65283, STIG-Legacy|V-51077, Vuln-ID|V-208888

Plugin: Unix

Control ID: 1635c8f57a311092e8e7ccfdbcceec2a5025f960bae221c13abd1e4d1dfa7bbb