Skip to content

The HYCU virtual appliance must generate audit records showing starting and ending time for administrator access to the system.

An XCCDF Rule

Description

It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enabled before a given process is created.

ID
SV-268250r1038779_rule
Version
HYCU-ND-000380
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following commands:
chkconfig auditd on
systemctl start auditd

Use the following command to review the logs:
cat /var/log/secure | less