STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269507

CAT III (Low)

AlmaLinux OS 9 must use a separate file system for the system audit data path.

Rule ID

SV-269507r1050390_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-001849

Discussion

Placing "/var/log/audit" in its own partition enables better separation between audit files and other system files, and helps ensure that auditing cannot be halted due to the partition running out of space.

Check Content

Verify that a separate file system/partition has been created for the system audit data path with the following command:

Note: /var/log/audit is used as the example as it is a common location.

$ findmnt /var/log/audit

TARGET         SOURCE                                                FSTYPE OPTIONS
/var/log/audit /dev/mapper/luks-29b74747-2f82-4472-82f5-0b5eb763effc xfs    rw,nosuid,nodev,noexec,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota

If no line is returned, this is a finding.

Fix Text

Migrate the system audit data path onto a separate file system.