The HYCU virtual appliance must generate audit records showing starting and ending time for administrator access to the system.
An XCCDF Rule
Description
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.
- ID
- SV-268250r1038779_rule
- Version
- HYCU-ND-000380
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following commands:
chkconfig auditd on
systemctl start auditd
Use the following command to review the logs:
cat /var/log/secure | less