Amazon Linux 2023 must audit all uses of the reboot command.

STIG ID: AZLX-23-002180  |  SRG: SRG-OS-000477-GPOS-00222 |  Severity: medium (CAT II)  |  CCI: CCI-000172 |  Vulnerability Id: V-274099

Vulnerability Discussion

Misuse of the reboot command may cause availability issues for the system.

Check

Verify Amazon Linux 2023 is configured to audit the execution of the "reboot" command with the following command:

$ sudo auditctl -l | grep reboot
-a always,exit -F path=/usr/sbin/reboot -F perm=x -F auid>=1000 -F auid!=unset -k privileged-reboot

If the command does not return a line, or the line is commented out, this is a finding.

Fix

Configure Amazon Linux 2023 so that the audit system generates an audit event for any successful/unsuccessful uses of the "reboot" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file:

-a always,exit -F path=/usr/sbin/reboot -F perm=x -F auid>=1000 -F auid!=unset -k privileged-reboot

To load the rules to the kernel immediately, use the following command:

$ sudo augenrules --load