Profile Applicability:
Level 1
Description:
The auditd service is responsible for writing audit records to disk. If this service is not enabled, audit events will not be logged, making it difficult to detect unauthorized or suspicious activity. Enabling the auditd service ensures that audit logs are persistently captured from system startup.
Rationale:
Running the audit daemon ensures that access and authorization events are recorded, which is crucial for incident detection, investigation, and meeting regulatory compliance requirements.
Impact:
Pros:
Ensures persistent audit logging across reboots
Supports forensic investigation and incident response
Fulfills compliance requirements (e.g., ISO 27001, SOC 2, HIPAA)
Cons:
Minor performance impact due to logging operations
Default Value:
The auditd package may be installed by default, but the service is not always enabled unless configured explicitly.
Pre-requisites:
auditdmust be installedRoot or
sudoaccess is required
Test Plan:
Using Linux Command Line:
Check if
auditdis enabled:
systemctl is-enabled auditd
Check if the service is running:
systemctl status auditd
Implementation Plan:
Using Linux Command Line:
Enable the
auditdservice:
systemctl enable auditd
Start the
auditdservice:
systemctl start auditd
Backout Plan:
Using Linux Command Line:
Stop the
auditdservice:
systemctl stop auditd
Disable the
auditdservice:
systemctl disable auditd
References:
CIS Amazon Linux 2 Benchmark v3.0.0
Auditd Service Configuration Guide
NIST SP 800-53 Revision 5 - AU-3