STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261417

CAT II (Medium)

Audispd must take appropriate action when SLEM 5 audit storage is full.

Rule ID

SV-261417r996662_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-001851

Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.

Check Content

Verify the audit system offloads audit records if SLEM 5 storage volume becomes full.

Check that the records are properly offloaded to a remote server with the following command:

     > sudo grep -i "disk_full_action" /etc/audisp/audisp-remote.conf
     disk_full_action = syslog

If "disk_full_action" is not set to "syslog", "single", or "halt" or the line is commented out, this is a finding.

Fix Text

Configure SLEM 5 to take the appropriate action if the audit storage is full.

Add or modify the following line in the "/etc/audisp/audisp-remote.conf" file:

disk_full_action = syslog