Configure immutable Audit login UIDs
An XCCDF Rule
Description
Configure kernel to prevent modification of login UIDs once they are set.
Changing login UIDs while this configuration is enforced requires special capabilities which
are not available to unprivileged users.
If the auditd
daemon is configured to use the
augenrules
program to read audit rules during daemon startup (the
default), add the following line to a file with suffix .rules
in the
directory /etc/audit/rules.d
in order to make login UIDs
immutable:
--loginuid-immutableIf the
auditd
daemon is configured to use the auditctl
utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules
file in order to make login UIDs
immutable:
--loginuid-immutable
Rationale
If modification of login UIDs is not prevented, they can be changed by unprivileged users and make auditing complicated or impossible.
- ID
- xccdf_org.ssgproject.content_rule_audit_rules_immutable_login_uids
- Severity
- Medium
- References
- Updated
Remediation - Ansible
- name: Gather the package facts
package_facts:
manager: auto
tags:
- DISA-STIG-RHEL-08-030122
- audit_rules_immutable_login_uids
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ] && rpm --quiet -q audit; then
# in case auditctl is used
if grep -q '^\s*ExecStartPost=-/sbin/auditctl' /usr/lib/systemd/system/auditd.service; then
if ! grep -q '^\s*--loginuid-immutable\s*$' /etc/audit/audit.rules; then