DISA STIGS Viewer

AlmaLinux OS 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.

Overview

Finding ID Version Rule ID IA Controls Severity
V-269459 ALMA-09-045780 SV-269459r1050342_rule   Medium
Description
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audits may degrade the system's performance by overwhelming the audit log. Misconfigured audits may also make it more difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
STIG Date
CloudLinux AlmaLinux OS 9 Security Technical Implementation Guide 2025-05-22

Details

Check Text (C-73490r1048753_chk)
Verify the mode of /etc/audit/auditd.conf with the command:

$ stat -c "%#a %n" /etc/audit/auditd.conf

0640 /etc/audit/auditd.conf

If "/etc/audit/auditd.conf" does not have a mode of "0640", this is a finding.
Fix Text (F-73391r1048754_fix)
Set the mode of /etc/audit/auditd.conf file to 0640 with the command:

$ chmod 0640 /etc/audit/auditd.conf