1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 Photon OS V1R1
  4. PHTN-67-000012 – The Photon operating system must be configured to audit the execution of privileged functions – gid 32

PHTN-67-000012 – The Photon operating system must be configured to audit the execution of privileged functions – gid 32

Details

Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing all actions by superusers is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat.

Satisfies: SRG-OS-000042-GPOS-00020, SRG-OS-000392-GPOS-00172

Solution

At the command line, execute the following commands:

# echo -a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv>>/etc/audit/rules.d/audit.STIG.rules
# echo -a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv>>/etc/audit/rules.d/audit.STIG.rules
# echo -a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv>>/etc/audit/rules.d/audit.STIG.rules
# echo -a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv>>/etc/audit/rules.d/audit.STIG.rules
# /sbin/augenrules –load

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability, Maintenance.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles