Skip to content

Commit 47234d8

Browse files
committed
profiles/rhel9+rhel10/hipaa: add grub2_audit_backlog_limit_argument
The HIPAA profile enables a large number of audit rules which generates high volumes of kernel audit events at boot. Without a raised audit_backlog_limit, the kauditd hold queue overflows on reboot. Set var_audit_backlog_limit=8192 and include the grub2_audit_backlog_limit_argument rule for both RHEL 9 and RHEL 10.
1 parent ebaad06 commit 47234d8

2 files changed

Lines changed: 4 additions & 0 deletions

File tree

products/rhel10/profiles/hipaa.profile

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ description: |-
2525

2626
selections:
2727
- hipaa:all
28+
- var_audit_backlog_limit=8192
29+
- grub2_audit_backlog_limit_argument
2830

2931
# RHEL 10 uses a different rule for auditing changes to selinux configuration
3032
# HIPAA 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d) and 164.312(e)

products/rhel9/profiles/hipaa.profile

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ description: |-
2424
selections:
2525
- hipaa:all
2626
- var_system_crypto_policy=fips
27+
- var_audit_backlog_limit=8192
2728
- no_rsh_trust_files
29+
- grub2_audit_backlog_limit_argument
2830
- "!audit_rules_dac_modification_fchmodat2"
2931
- "!audit_rules_file_deletion_events_renameat2"
3032
- "!audit_rules_kernel_module_loading_finit"

0 commit comments

Comments
 (0)