Skip to content

The HYCU virtual appliance must initiate session auditing upon startup.

An XCCDF Rule

Description

It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.

ID
SV-268248r1038777_rule
Version
HYCU-ND-000360
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command:
chkconfig auditd on

Use the following command to review the logs:
cat /var/log/secure | less