Table of Contents

4.1.1.2 Ensure system is disabled when audit logs are full (Scored)

Profile Applicability

Level 2 - Server
Level 2 - Workstation 

Description

The auditd daemon can be configured to halt the system when the audit logs are full.

Rationale

In high security contexts, the risk of detecting unauthorized access or nonrepudiation exceeds the benefit of the system's availability.

Audit

Run the following commands and verify output matches:

# grep space_left_action /etc/audit/auditd.conf 
space_left_action = email 
# grep action_mail_acct /etc/audit/auditd.conf 
action_mail_acct = root 
# grep admin_space_left_action /etc/audit/auditd.conf 
admin_space_left_action = halt

Remediation

Set the following parameters in /etc/audit/auditd.conf:

space_left_action = email 
action_mail_acct = root 
admin_space_left_action = halt