STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide

V-256528

CAT II (Medium)

The Photon operating system must configure auditd to keep logging in the event max log file size is reached.

Rule ID

SV-256528r958752_rule

STIG

VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-001849

Discussion

Audit logs are most useful when accessible by date, rather than size. This can be accomplished through a combination of an audit log rotation cron job, setting a reasonable number of logs to keep, and configuring auditd to not rotate the logs on its own. This ensures audit logs are accessible to the information system security officer (ISSO) in the event of a central log processing failure. If another solution is not used to rotate auditd logs, auditd can be configured to rotate logs.

Check Content

At the command line, run the following command:

# grep "^max_log_file_action" /etc/audit/auditd.conf

Example result:

max_log_file_action = IGNORE

If logs are rotated outside of auditd with a tool such as logrotated, and this setting is not set to "IGNORE", this is a finding.

If logs are NOT rotated outside of auditd, and this setting is not set to "ROTATE", this is a finding.

Fix Text

Navigate to and open:

/etc/audit/auditd.conf

Add or change the "max_log_file_action" line as follows:

max_log_file_action = IGNORE

Note: This can also be set to "ROTATE" if another tool is not used to rotate auditd logs.

At the command line, run the following commands:

# killproc auditd -TERM
# systemctl start auditd