The Red Hat Linux audit service comes with precompiled rule sets for various compliance requirements. In this lab, we will configure a Red Hat host’s audit rules to include the STIG (Security Technical Implementation Guide) compliance rule set. This will allow us to identify any points at which we are not compliant with STIG requirements.
*This course is not approved or sponsored by Red Hat.*
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Implement the Red Hat included STIG audit rules
SSH into the host and switch to root via
sudo su
Make a backup of the current audit rules using the following command:
cp /etc/audit/rules.d/audit.rules /etc/audit/rules.d/audit.rules_backup
Copy the STIG audit rules into the
audit.rules
file with the following command:cd /usr/share/doc/audit-2.8.1/rules
cat 30-stig.rules 99-finalize.rules >> /etc/audit/rules.d/audit.rules
y (accept to overwrite file)
- Restart the auditd service
To restart the
auditd
service, use the following command:sudo service auditd restart
Run the following command to verify the status is active (running):
service auditd status