STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 9 Security Technical Implementation Guide

V-258164

CAT II (Medium)

RHEL 9 audit system must audit local events.

Rule ID

SV-258164r1045301_rule

STIG

Red Hat Enterprise Linux 9 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-000169

Discussion

Without establishing what type of events occurred, the source of events, where events occurred, and the outcome of events, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. If option "local_events" isn't set to "yes" only events from network will be aggregated. Satisfies: SRG-OS-000062-GPOS-00031, SRG-OS-000480-GPOS-00227

Check Content

Verify that the RHEL 9 audit system is configured to audit local events with the following command:

$ sudo grep local_events /etc/audit/auditd.conf 

local_events = yes 

If "local_events" isn't set to "yes", if the command does not return a line, or the line is commented out, this is a finding.

Fix Text

Configure RHEL 9 to generate audit records for local events by adding or updating the following line in "/etc/audit/auditd.conf":

local_events = yes 

The audit daemon must be restarted for the changes to take effect.