auditd is a Linux thing, of course.
Your organization should decide what action is appropriate should auditd decide it is critically out of space. Some environments value watching for security or integrity events so much, that a gap in logging is intolerable. Many others are not required to sacrifice availability for fewer gaps in audit logs.
As to your options, see man auditd.conf
for config directives including admin_space_left_action. halt would explain your powering off host. single may be a useful compromise, stopping nearly all services, but allowing fixing the space problem on a console. Or merely report on the problem (syslog, email), lose data (rotate) or do nothing (ignore). Of course some of these mean you cannot claim to have done "Ensure system is disabled when audit logs are full".
Note that automated tools may configure the most conservative option, such as this Ansible playbook defaulting to halt.
Personally, I would be more suspect of an environment where halt is the policy but some hosts have outside the automation exceptions, compared to a policy that was honest and configured syslog. Although I am not a compliance person.
Always more than one way to solve things. Could boot a rescue distro or single user mode, then extend storage or purge logs to recover space.
All storage has the possibility to fill up. Find the root cause in this instance. Evaluate the necessity of rules, audit log space requirements has enormous variation depending on rules and workload. Improve your capacity planning and storage alerting to be reduce future space problems.