Skip to content

SLEM 5 must generate audit records for all uses of the "umount" system call.

An XCCDF Rule

Description

Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.

ID
SV-261460r996787_rule
Version
SLEM-05-654185
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure SLEM 5 to generate an audit record for all uses of the "umount" and "umount2" system calls.

Add or modify the following lines in the "/etc/audit/rules.d/audit.rules" file:

-a always,exit -F arch=b32 -S umount -F auid>=1000 -F auid!=unset -k privileged-umount
-a always,exit -F arch=b32 -S umount2 -F auid>=1000 -F auid!=unset -k privileged-umount