Files
macos_security/rules/audit/audit_failure_halt.yaml
Bob Gendler 5654d69905 refactor[rules]Added rule, updated rules
Created rule for the STIG
Updated rules to match CIS
2025-12-05 16:16:02 -05:00

50 lines
1.3 KiB
YAML

id: audit_failure_halt
title: Configure System to Shut Down Upon Audit Failure
discussion: |
The audit service _MUST_ be configured to shut down the computer if it is unable to audit system events.
Once audit failure occurs, user and system activity are no longer recorded, and malicious activity could go undetected. Audit processing failures can occur due to software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded.
check: |
/usr/bin/awk -F':' '/^policy/ {print $NF}' /etc/security/audit_control | /usr/bin/tr ',' '\n' | /usr/bin/grep -Ec 'ahlt'
result:
integer: 1
fix: |
[source,bash]
----
/usr/bin/sed -i.bak 's/^policy.*/policy: ahlt,argv/' /etc/security/audit_control; /usr/sbin/audit -s
----
references:
cce:
- CCE-95111-1
cci:
- CCI-000140
800-53r5:
- AU-5
800-53r4:
- AU-5
srg:
- SRG-OS-000047-GPOS-00023
disa_stig:
- N/A
800-171r3:
- 03.03.04
cmmc:
- AU.L2-3.3.4
macOS:
- '26.0'
tags:
- 800-53r5_low
- 800-53r5_moderate
- 800-53r5_high
- 800-53r4_low
- 800-53r4_moderate
- 800-53r4_high
- 800-171
- cnssi-1253_low
- cnssi-1253_high
- cmmc_lvl2
- cnssi-1253_moderate
severity: medium
mobileconfig: false
mobileconfig_info: