1. Home
  2. Security Hardening
  3. DISA STIG Apple Mac OSX 10 15 V1R7
  4. AOSX-15-001029 – The macOS system must allocate audit record storage capacity to store at least one week’s worth of audit records when audit records are not immediately sent to a central audit record storage facility.

AOSX-15-001029 – The macOS system must allocate audit record storage capacity to store at least one week’s worth of audit records when audit records are not immediately sent to a central audit record storage facility.

Details

The audit service must be configured to require that records are kept for seven days or longer before deletion when there is no central audit record storage facility. When ‘expire-after’ is set to ‘7d’, the audit service will not delete audit logs until the log data is at least seven days old.

Solution

Edit the ‘/etc/security/audit_control’ file and change the value for ‘expire-after’ to the amount of time audit logs should be kept for the system. Use the following command to set the ‘expire-after’ value to ‘7d’:

/usr/bin/sudo /usr/bin/sed -i.bak ‘s/.*expire-after.*/expire-after:7d/’ /etc/security/audit_control; /usr/bin/sudo /usr/sbin/audit -s

A text editor may also be used to implement the required updates to the ‘/etc/security/audit_control’ file.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles