Amazon Linux 2023 must produce audit records containing information to establish the identity of any individual or process associated with the event.

STIG ID: AZLX-23-002260  |  SRG: SRG-OS-000255-GPOS-00096 |  Severity: medium (CAT II)  |  CCI: CCI-001487 |  Vulnerability Id: V-274115

Vulnerability Discussion

Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event.

Check

Verify Amazon Linux 2023 is configured so that the audit system resolves audit information before writing to disk, with the following command:

$ sudo grep log_format /etc/audit/auditd.conf
log_format = ENRICHED

If the "log_format" option is not "ENRICHED", or the line is commented out, this is a finding.

Fix

Configure Amazon Linux 2023 so that the audit system resolves audit information before writing to disk.

Edit the /etc/audit/auditd.conf file and add or update the "log_format" option:

log_format = ENRICHED

The audit daemon must be restarted for changes to take effect.