1. Home
  2. Security Hardening
  3. CIS Amazon Linux 2 V2.0.0 L2
  4. Ensure audit_backlog_limit is sufficient

Ensure audit_backlog_limit is sufficient

Details

The backlog limit has a default setting of 64

Rationale:

During boot if audit=1, then the backlog will hold 64 records. If more than 64 records are created during boot, auditd records will be lost and potential malicious activity could go undetected.

Solution

Edit /etc/default/grub and add audit_backlog_limit= to GRUB_CMDLINE_LINUX:
Example:

GRUB_CMDLINE_LINUX=’audit_backlog_limit=8192′

Run the following command to update the grub2 configuration:

# grub2-mkconfig -o /boot/grub2/grub.cfg

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability, System and Information Integrity.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles