Vulnerability Discussion
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event.
Check
Verify that the AlmaLinux OS 9 audit system is configured to resolve audit information before writing to disk with the following command:
$ grep log_format /etc/audit/auditd.conf
log_format = ENRICHED
If the "log_format" option is not "ENRICHED", or the line is commented out, this is a finding.
Fix
Edit the /etc/audit/auditd.conf file and add or update the "log_format" option:
log_format = ENRICHED
The audit daemon must be restarted for changes to take effect.