STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215240

CAT II (Medium)

AIX must produce audit records containing the full-text recording of privileged commands.

Rule ID

SV-215240r958422_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000135

Discussion

Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.

Check Content

Verify the audit daemon is configured for full-text recording of privileged commands: 

The log file can be set by the "trail" variable in /etc/security/audit/config.

# grep trail /etc/security/audit/config
        trail = /audit/trail

Note: The default log file is /audit/trail.

Use the following command to display the audit events:

# /usr/sbin/auditpr -i <audit log file> -v

event           login    status      time                     command           
              wpar name                 
--------------- -------- ----------- ------------------------ ------------------
------------- ------------------------- 
S_PASSWD_READ   root     OK          Sat Aug 26 19:35:00 2017 cron
              Global
        audit object read event detected /etc/security/passwd
S_PASSWD_READ   root     OK          Sat Aug 26 19:35:00 2017 cron
              Global
        audit object read event detected /etc/security/passwd
CRON_Start      root     OK          Sat Aug 26 19:35:00 2017 cron
              Global
        event = start cron job cmd = /usr/sbin/dumpctrl -k >/dev/null 2>/dev/nul
l time = Sat Aug 26 19:35:00 2017
FS_Chdir        root     OK          Sat Aug 26 19:35:00 2017 cron
              Global
        change current directory to: /

If the  full-text recording of privileged command is not displayed, this is a finding. 

More information on the command options used above:
           - v detailed information for the event

Fix Text

Reset the audit system with the following command:
# /usr/sbin/audit shutdown

Start the audit system with the following command:
# /usr/sbin/audit start