STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

V-261421

CAT III (Low)

SLEM 5 audit event multiplexor must be configured to use Kerberos.

Rule ID

SV-261421r996672_rule

STIG

SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-001851

Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Allowing devices and users to connect to or from the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Audit events that may include sensitive data must be encrypted prior to transmission. Kerberos provides a mechanism to provide both authentication and encryption for audit event records.

Check Content

Determine if SLEM 5 audit event multiplexor is configured to use Kerberos by running the following command:

     > sudo grep enable_krb5 /etc/audisp/audisp-remote.conf
     enable_krb5 = yes

If "enable_krb5" is not set to "yes", or is commented out, this is a finding.

Fix Text

Configure SLEM 5 audit event multiplexor to use Kerberos.

Add or modify the following line in the "/etc/audisp/audisp-remote.conf" file:

enable_krb5 = yes