|
|
0cd8e1 |
commit 470fb4275710c828f3cdd91ce65c69f78e2e6451
|
|
|
0cd8e1 |
Author: Gabriel Becker <ggasparb@redhat.com>
|
|
|
0cd8e1 |
Date: Fri Apr 5 16:28:44 2019 +0200
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
Mark rules not applicable for container as machine only.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/services/obsolete/inetd_and_xinetd/group.yml b/linux_os/guide/services/obsolete/inetd_and_xinetd/group.yml
|
|
|
0cd8e1 |
index 6acdd02..79d7023 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/services/obsolete/inetd_and_xinetd/group.yml
|
|
|
0cd8e1 |
+++ b/linux_os/guide/services/obsolete/inetd_and_xinetd/group.yml
|
|
|
0cd8e1 |
@@ -10,3 +10,5 @@ description: |-
|
|
|
0cd8e1 |
controls and perform some logging. It has been largely obsoleted by other
|
|
|
0cd8e1 |
features, and it is not installed by default. The older Inetd service
|
|
|
0cd8e1 |
is not even available as part of {{{ full_name }}}.
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages.rule b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages.rule
|
|
|
0cd8e1 |
index 5c58455..815097b 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/install_smartcard_packages.rule
|
|
|
0cd8e1 |
@@ -37,5 +37,3 @@ ocil: |-
|
|
|
0cd8e1 |
To verify the operating system has the packages required for multifactor
|
|
|
0cd8e1 |
authentication installed, run the following command:
|
|
|
0cd8e1 |
$ sudo yum list installed esc pam_pkcs11 authconfig-gtk
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_auth.rule b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_auth.rule
|
|
|
0cd8e1 |
index e4c0870..5b01b62 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_auth.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_auth.rule
|
|
|
0cd8e1 |
@@ -41,5 +41,3 @@ references:
|
|
|
0cd8e1 |
ocil_clause: 'non-exempt accounts are not using CAC authentication'
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
ocil: "Interview the SA to determine if all accounts not exempted by policy are\nusing CAC authentication.\nFor DoD systems, the following systems and accounts are exempt from using\nsmart card (CAC) authentication:\n\n- SIPRNET systems
\n- Standalone systems
\n- Application accounts
\n- Temporary employee accounts, such as students or interns, who cannot easily receive a CAC or PIV
\n- Operational tactical locations that are not collocated with RAPIDS workstations to issue CAC or ALT
\n- Test systems, such as those with an Interim Approval to Test (IATT) and use a separate VPN, firewall, or security measure preventing access to network and system components from outside the protection boundary documented in the IATT.
\n "
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_configure_cert_checking.rule b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_configure_cert_checking.rule
|
|
|
0cd8e1 |
index c68db6d..9af1126 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_configure_cert_checking.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/accounts/accounts-physical/screen_locking/smart_card_login/smartcard_configure_cert_checking.rule
|
|
|
0cd8e1 |
@@ -42,5 +42,3 @@ ocil: |-
|
|
|
0cd8e1 |
cert_policy = ca, ocsp_on, signature;
|
|
|
0cd8e1 |
cert_policy = ca, ocsp_on, signature;
|
|
|
0cd8e1 |
cert_policy = ca, ocsp_on, signature;
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chmod.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chmod.rule
|
|
|
0cd8e1 |
index 98fb3f8..b3bba5b 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chmod.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chmod.rule
|
|
|
0cd8e1 |
@@ -58,4 +58,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chown.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chown.rule
|
|
|
0cd8e1 |
index 77be3c4..c3e5036 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chown.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_chown.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod.rule
|
|
|
0cd8e1 |
index e530ea9..76bb69d 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmod.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat.rule
|
|
|
0cd8e1 |
index 2410fc9..502e3a0 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchmodat.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown.rule
|
|
|
0cd8e1 |
index 4f0c7e7..d980704 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchown.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat.rule
|
|
|
0cd8e1 |
index 12d51f8..99d2083 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fchownat.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr.rule
|
|
|
0cd8e1 |
index b0ff227..bda4448 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fremovexattr.rule
|
|
|
0cd8e1 |
@@ -62,4 +62,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr.rule
|
|
|
0cd8e1 |
index 4e19015..e5ba297 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_fsetxattr.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown.rule
|
|
|
0cd8e1 |
index 39fb8bd..d88a48f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lchown.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lremovexattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lremovexattr.rule
|
|
|
0cd8e1 |
index 52d0c85..0b0100e 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lremovexattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lremovexattr.rule
|
|
|
0cd8e1 |
@@ -62,4 +62,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr.rule
|
|
|
0cd8e1 |
index f7ffae4..07222b0 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_lsetxattr.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr.rule
|
|
|
0cd8e1 |
index 3ff38cf..f27667d 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_removexattr.rule
|
|
|
0cd8e1 |
@@ -61,4 +61,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr.rule
|
|
|
0cd8e1 |
index da633bd..ccc90e8 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_dac_actions/audit_rules_dac_modification_setxattr.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_chcon.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_chcon.rule
|
|
|
0cd8e1 |
index f2c7891..8e40014 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_chcon.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_chcon.rule
|
|
|
0cd8e1 |
@@ -47,5 +47,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep "path=/usr/bin/chcon" /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
The output should return something similar to:
|
|
|
0cd8e1 |
-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=4294967295 -F key=privileged-priv_change
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_restorecon.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_restorecon.rule
|
|
|
0cd8e1 |
index ea42555..2a97b84 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_restorecon.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_restorecon.rule
|
|
|
0cd8e1 |
@@ -46,5 +46,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep "path=/usr/sbin/restorecon" /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
The output should return something similar to:
|
|
|
0cd8e1 |
-a always,exit -F path=/usr/sbin/restorecon -F perm=x -F auid>=1000 -F auid!=4294967295 -F key=privileged-priv_change
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_semanage.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_semanage.rule
|
|
|
0cd8e1 |
index dd62afa..c2aedce 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_semanage.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_semanage.rule
|
|
|
0cd8e1 |
@@ -47,5 +47,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep "path=/usr/sbin/semanage" /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
The output should return something similar to:
|
|
|
0cd8e1 |
-a always,exit -F path=/usr/sbin/semanage -F perm=x -F auid>=1000 -F auid!=4294967295 -F key=privileged-priv_change
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_setsebool.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_setsebool.rule
|
|
|
0cd8e1 |
index 2804b8d..247453e 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_setsebool.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_execution_selinux_commands/audit_rules_execution_setsebool.rule
|
|
|
0cd8e1 |
@@ -47,5 +47,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep "path=/usr/sbin/setsebool" /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
The output should return something similar to:
|
|
|
0cd8e1 |
-a always,exit -F path=/usr/sbin/setsebool -F perm=x -F auid>=1000 -F auid!=4294967295 -F key=privileged-priv_change
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events.rule
|
|
|
0cd8e1 |
index d110f8a..916af4c 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events.rule
|
|
|
0cd8e1 |
@@ -66,4 +66,3 @@ warnings:
|
|
|
0cd8e1 |
<tt>audit_rules_file_deletion_events_unlinkat</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rename.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rename.rule
|
|
|
0cd8e1 |
index 51b1d54..80eb011 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rename.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rename.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="rename") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat.rule
|
|
|
0cd8e1 |
index 96133fc..b219eda 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_renameat.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="renameat") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir.rule
|
|
|
0cd8e1 |
index 21abd3a..37e7fb2 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_rmdir.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="rmdir") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink.rule
|
|
|
0cd8e1 |
index 25c2ec2..7c392bc 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlink.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="unlink") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat.rule
|
|
|
0cd8e1 |
index 390a4e5..793f9b0 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_file_deletion_events/audit_rules_file_deletion_events_unlinkat.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="unlinkat") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_delete.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_delete.rule
|
|
|
0cd8e1 |
index 370fbab..58e81a1 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_delete.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_delete.rule
|
|
|
0cd8e1 |
@@ -39,4 +39,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="delete_module") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit.rule
|
|
|
0cd8e1 |
index d86680d..992bce9 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_finit.rule
|
|
|
0cd8e1 |
@@ -37,4 +37,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="finit_module") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_init.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_init.rule
|
|
|
0cd8e1 |
index 01de6c8..7631ecd 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_init.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_init.rule
|
|
|
0cd8e1 |
@@ -38,4 +38,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="init_module") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_insmod.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_insmod.rule
|
|
|
0cd8e1 |
index 9610d30..3c4e05f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_insmod.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_insmod.rule
|
|
|
0cd8e1 |
@@ -41,5 +41,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/usr/sbin/insmod"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_modprobe.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_modprobe.rule
|
|
|
0cd8e1 |
index bd266b8..8ce37aa 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_modprobe.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_modprobe.rule
|
|
|
0cd8e1 |
@@ -41,5 +41,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/usr/sbin/modprobe"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_rmmod.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_rmmod.rule
|
|
|
0cd8e1 |
index b913129..7ab7824 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_rmmod.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_kernel_module_loading/audit_rules_kernel_module_loading_rmmod.rule
|
|
|
0cd8e1 |
@@ -41,5 +41,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/usr/sbin/rmmod"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events.rule
|
|
|
0cd8e1 |
index 11d187d..20edbdf 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events.rule
|
|
|
0cd8e1 |
@@ -54,4 +54,3 @@ warnings:
|
|
|
0cd8e1 |
<tt>audit_rules_login_events_lastlog</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_faillock.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_faillock.rule
|
|
|
0cd8e1 |
index b730fdd..78f9d91 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_faillock.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_faillock.rule
|
|
|
0cd8e1 |
@@ -43,5 +43,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/var/log/faillock"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog.rule
|
|
|
0cd8e1 |
index 83c5cb7..6c1919d 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_lastlog.rule
|
|
|
0cd8e1 |
@@ -43,5 +43,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/var/log/lastlog"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_tallylog.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_tallylog.rule
|
|
|
0cd8e1 |
index 9a9770a..b0eed40 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_tallylog.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_login_events/audit_rules_login_events_tallylog.rule
|
|
|
0cd8e1 |
@@ -43,5 +43,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/var/log/tallylog"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands.rule
|
|
|
0cd8e1 |
index 3815429..b6ec543 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands.rule
|
|
|
0cd8e1 |
@@ -82,4 +82,3 @@ warnings:
|
|
|
0cd8e1 |
<tt>audit_rules_privileged_commands_passwd</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chage.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chage.rule
|
|
|
0cd8e1 |
index 9d6c828..5d0478a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chage.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chage.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep chage /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chsh.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chsh.rule
|
|
|
0cd8e1 |
index ac5c38a..e89b93f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chsh.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_chsh.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep chsh /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_crontab.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_crontab.rule
|
|
|
0cd8e1 |
index 03bcb6c..dfffee9 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_crontab.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_crontab.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep crontab /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_gpasswd.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_gpasswd.rule
|
|
|
0cd8e1 |
index 5c8c407..7d77eb9 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_gpasswd.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_gpasswd.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep gpasswd /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_newgrp.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_newgrp.rule
|
|
|
0cd8e1 |
index b8f8e5c..e97e83c 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_newgrp.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_newgrp.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep newgrp /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pam_timestamp_check.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pam_timestamp_check.rule
|
|
|
0cd8e1 |
index fda2e0c..6398885 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pam_timestamp_check.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pam_timestamp_check.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep pam_timestamp_check /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_passwd.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_passwd.rule
|
|
|
0cd8e1 |
index cb41772..fc955cd 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_passwd.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_passwd.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep passwd /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postdrop.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postdrop.rule
|
|
|
0cd8e1 |
index 6f3f787..1f55e04 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postdrop.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postdrop.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep postdrop /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postqueue.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postqueue.rule
|
|
|
0cd8e1 |
index d6f4eeb..91a9d64 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postqueue.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_postqueue.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep postqueue /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pt_chown.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pt_chown.rule
|
|
|
0cd8e1 |
index 21e0a11..293a033 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pt_chown.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_pt_chown.rule
|
|
|
0cd8e1 |
@@ -47,4 +47,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep pt_chown /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_ssh_keysign.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_ssh_keysign.rule
|
|
|
0cd8e1 |
index fa7ff2b..4bb59ae 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_ssh_keysign.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_ssh_keysign.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep ssh-keysign /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_su.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_su.rule
|
|
|
0cd8e1 |
index d791805..7c2e986 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_su.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_su.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep su /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo.rule
|
|
|
0cd8e1 |
index e8b3585..4103c8a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudo.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep sudo /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudoedit.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudoedit.rule
|
|
|
0cd8e1 |
index 8984a84..6f2fd62 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudoedit.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_sudoedit.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep sudoedit /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_umount.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_umount.rule
|
|
|
0cd8e1 |
index 5b636ea..db6d4db 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_umount.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_umount.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep umount /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd.rule
|
|
|
0cd8e1 |
index 205bf97..743ea9f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_unix_chkpwd.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep unix_chkpwd /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_userhelper.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_userhelper.rule
|
|
|
0cd8e1 |
index 91f31f3..97c3683 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_userhelper.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands_userhelper.rule
|
|
|
0cd8e1 |
@@ -50,4 +50,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep userhelper /etc/audit/audit.rules /etc/audit/rules.d/*
|
|
|
0cd8e1 |
It should return a relevant line in the audit rules.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable.rule
|
|
|
0cd8e1 |
index 2c42c74..991abcf 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_immutable.rule
|
|
|
0cd8e1 |
@@ -37,5 +37,3 @@ references:
|
|
|
0cd8e1 |
hipaa: 164.308(a)(1)(ii)(D),164.308(a)(3)(ii)(A),164.308(a)(5)(ii)(C),164.312(a)(2)(i),164.310(a)(2)(iv),164.312(d),164.310(d)(2)(iii),164.312(b),164.312(e)
|
|
|
0cd8e1 |
nist: AC-6,AU-1(b),AU-2(a),AU-2(c),AU-2(d),IR-5
|
|
|
0cd8e1 |
pcidss: Req-10.5.2
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_mac_modification.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_mac_modification.rule
|
|
|
0cd8e1 |
index 5952dbb..0636d42 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_mac_modification.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_mac_modification.rule
|
|
|
0cd8e1 |
@@ -48,4 +48,3 @@ ocil: |-
|
|
|
0cd8e1 |
configuration, a line should be returned (including
|
|
|
0cd8e1 |
<tt>perm=wa</tt> indicating permissions that are watched).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_media_export.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_media_export.rule
|
|
|
0cd8e1 |
index 28c64ca..2ec5b8d 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_media_export.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_media_export.rule
|
|
|
0cd8e1 |
@@ -51,4 +51,3 @@ ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for all media exportation events, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep syscall | grep mount
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_networkconfig_modification.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_networkconfig_modification.rule
|
|
|
0cd8e1 |
index 55e1893..9ee65de 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_networkconfig_modification.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_networkconfig_modification.rule
|
|
|
0cd8e1 |
@@ -56,4 +56,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for network configuration changes, a line should be returned for
|
|
|
0cd8e1 |
each file specified (and <tt>perm=wa</tt> should be indicated for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_session_events.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_session_events.rule
|
|
|
0cd8e1 |
index 017a053..e63f61a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_session_events.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_session_events.rule
|
|
|
0cd8e1 |
@@ -41,5 +41,3 @@ references:
|
|
|
0cd8e1 |
nist: AC-17(7),AU-1(b),AU-2(a),AU-2(c),AU-2(d),AU-12(a),AU-12(c),IR-5
|
|
|
0cd8e1 |
ospp@rhel7: FAU_GEN.1.1.c
|
|
|
0cd8e1 |
pcidss: Req-10.2.3
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions.rule
|
|
|
0cd8e1 |
index 3be1932..15c33a2 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_sysadmin_actions.rule
|
|
|
0cd8e1 |
@@ -47,5 +47,3 @@ ocil_clause: 'there is not output'
|
|
|
0cd8e1 |
ocil: |-
|
|
|
0cd8e1 |
To verify that auditing is configured for system administrator actions, run the following command:
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/etc/sudoers\|watch=/etc/sudoers.d"
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_system_shutdown.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_system_shutdown.rule
|
|
|
0cd8e1 |
index d40c9df..7be7503 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_system_shutdown.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_system_shutdown.rule
|
|
|
0cd8e1 |
@@ -47,4 +47,3 @@ ocil: |-
|
|
|
0cd8e1 |
The output should contain:
|
|
|
0cd8e1 |
-f 2
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification.rule
|
|
|
0cd8e1 |
index 2838470..2278906 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification.rule
|
|
|
0cd8e1 |
@@ -69,4 +69,3 @@ warnings:
|
|
|
0cd8e1 |
<tt>audit_rules_usergroup_modification_passwd</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group.rule
|
|
|
0cd8e1 |
index 143e63b..1a5251f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_group.rule
|
|
|
0cd8e1 |
@@ -53,4 +53,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for account changes, lines should be returned for
|
|
|
0cd8e1 |
each file specified (and with <tt>perm=wa</tt> for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow.rule
|
|
|
0cd8e1 |
index 5e14989..0d54b2f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_gshadow.rule
|
|
|
0cd8e1 |
@@ -53,4 +53,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for account changes, lines should be returned for
|
|
|
0cd8e1 |
each file specified (and with <tt>perm=wa</tt> for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd.rule
|
|
|
0cd8e1 |
index 9e7ce3d..0567184 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_opasswd.rule
|
|
|
0cd8e1 |
@@ -53,4 +53,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for account changes, lines should be returned for
|
|
|
0cd8e1 |
each file specified (and with <tt>perm=wa</tt> for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd.rule
|
|
|
0cd8e1 |
index 76bce57..1c97a40 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_passwd.rule
|
|
|
0cd8e1 |
@@ -53,4 +53,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for account changes, lines should be returned for
|
|
|
0cd8e1 |
each file specified (and with <tt>perm=wa</tt> for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow.rule
|
|
|
0cd8e1 |
index 74819f5..4076bac 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_rules_usergroup_modification_shadow.rule
|
|
|
0cd8e1 |
@@ -53,4 +53,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is configured to watch for account changes, lines should be returned for
|
|
|
0cd8e1 |
each file specified (and with <tt>perm=wa</tt> for each).
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_adjtimex.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_adjtimex.rule
|
|
|
0cd8e1 |
index 9dc2ceb..6e86964 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_adjtimex.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_adjtimex.rule
|
|
|
0cd8e1 |
@@ -52,4 +52,3 @@ ocil_clause: 'the system is not configured to audit time changes'
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="adjtimex") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_clock_settime.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_clock_settime.rule
|
|
|
0cd8e1 |
index 436f5f0..66e7f7c 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_clock_settime.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_clock_settime.rule
|
|
|
0cd8e1 |
@@ -52,4 +52,3 @@ ocil_clause: 'the system is not configured to audit time changes'
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="clock_settime") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_settimeofday.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_settimeofday.rule
|
|
|
0cd8e1 |
index 22ec976..654fd13 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_settimeofday.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_settimeofday.rule
|
|
|
0cd8e1 |
@@ -52,4 +52,3 @@ ocil_clause: 'the system is not configured to audit time changes'
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="settimeofday") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_stime.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_stime.rule
|
|
|
0cd8e1 |
index 0572156..4c0ca3c 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_stime.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_stime.rule
|
|
|
0cd8e1 |
@@ -58,4 +58,3 @@ ocil: |-
|
|
|
0cd8e1 |
If the system is 64-bit only, this is not applicable
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_audit_syscall(syscall="stime") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_watch_localtime.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_watch_localtime.rule
|
|
|
0cd8e1 |
index 2fb8f7d..d4c02a2 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_watch_localtime.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_time_rules/audit_rules_time_watch_localtime.rule
|
|
|
0cd8e1 |
@@ -51,4 +51,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo auditctl -l | grep "watch=/etc/localtime"
|
|
|
0cd8e1 |
If the system is configured to audit this activity, it will return a line.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification.rule
|
|
|
0cd8e1 |
index ea42793..1e2437a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification.rule
|
|
|
0cd8e1 |
@@ -70,4 +70,3 @@ warnings:
|
|
|
0cd8e1 |
<tt>audit_rules_unsuccessful_file_modification_creat</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_creat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_creat.rule
|
|
|
0cd8e1 |
index a328ff9..bd91a9f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_creat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_creat.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_ftruncate.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_ftruncate.rule
|
|
|
0cd8e1 |
index 6229398..8fadeaa 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_ftruncate.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_ftruncate.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open.rule
|
|
|
0cd8e1 |
index 13f12fe..656de99 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at.rule
|
|
|
0cd8e1 |
index ce4193a..30ee748 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_open_by_handle_at.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_openat.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_openat.rule
|
|
|
0cd8e1 |
index 6f3c38a..532f355 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_openat.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_openat.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_truncate.rule b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_truncate.rule
|
|
|
0cd8e1 |
index f6e0263..d7d37ac 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_truncate.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/audit_unsuccessful_file_modification/audit_rules_unsuccessful_file_modification_truncate.rule
|
|
|
0cd8e1 |
@@ -55,4 +55,3 @@ warnings:
|
|
|
0cd8e1 |
have been placed independent of other system calls. Grouping these system
|
|
|
0cd8e1 |
calls with others as identifying earlier in this guide is more efficient.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/directory_access_var_log_audit.rule b/linux_os/guide/system/auditing/auditd_configure_rules/directory_access_var_log_audit.rule
|
|
|
0cd8e1 |
index acf6fc6..b892c5a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/directory_access_var_log_audit.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/directory_access_var_log_audit.rule
|
|
|
0cd8e1 |
@@ -31,3 +31,5 @@ ocil: |-
|
|
|
0cd8e1 |
/var/log/audit directory, run the following command:
|
|
|
0cd8e1 |
$ sudo grep "dir=/var/log/audit" /etc/audit/audit.rules
|
|
|
0cd8e1 |
If the system is configured to audit this activity, it will return a line.
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit.rule b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit.rule
|
|
|
0cd8e1 |
index 14d41d0..543f887 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_ownership_var_log_audit.rule
|
|
|
0cd8e1 |
@@ -34,4 +34,3 @@ ocil: |-
|
|
|
0cd8e1 |
{{{ describe_file_owner(file="/var/log/audit", owner="root") }}}
|
|
|
0cd8e1 |
{{{ describe_file_owner(file="/var/log/audit/*", owner="root") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit.rule b/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit.rule
|
|
|
0cd8e1 |
index 319b1bb..39ddc5b 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/auditd_configure_rules/file_permissions_var_log_audit.rule
|
|
|
0cd8e1 |
@@ -36,4 +36,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo ls -l /var/log/audit
|
|
|
0cd8e1 |
Audit logs must be mode 0640 or less permissive.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_configure_remote_server.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_configure_remote_server.rule
|
|
|
0cd8e1 |
index 94af473..c5cf669 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_configure_remote_server.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_configure_remote_server.rule
|
|
|
0cd8e1 |
@@ -38,4 +38,3 @@ ocil: |-
|
|
|
0cd8e1 |
is an IP address or hostname:
|
|
|
0cd8e1 |
remote_server = REMOTE_SYSTEM
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_disk_full_action.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_disk_full_action.rule
|
|
|
0cd8e1 |
index 502843d..e4e96d4 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_disk_full_action.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_disk_full_action.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ ocil: |-
|
|
|
0cd8e1 |
Acceptable values also include <tt>syslog</tt> and
|
|
|
0cd8e1 |
<tt>halt</tt>.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_encrypt_sent_records.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_encrypt_sent_records.rule
|
|
|
0cd8e1 |
index 07d36df..94292ff 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_encrypt_sent_records.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_encrypt_sent_records.rule
|
|
|
0cd8e1 |
@@ -34,5 +34,3 @@ ocil: |-
|
|
|
0cd8e1 |
$ sudo grep -i enable_krb5 /etc/audisp/audisp-remote.conf
|
|
|
0cd8e1 |
The output should return the following:
|
|
|
0cd8e1 |
enable_krb5 = yes
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_network_failure_action.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_network_failure_action.rule
|
|
|
0cd8e1 |
index 7fc5566..79b8909 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_network_failure_action.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_network_failure_action.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ ocil: |-
|
|
|
0cd8e1 |
Acceptable values also include <tt>syslog</tt> and
|
|
|
0cd8e1 |
<tt>halt</tt>.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated.rule
|
|
|
0cd8e1 |
index c2891ab..75edf6a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_audispd_syslog_plugin_activated.rule
|
|
|
0cd8e1 |
@@ -40,5 +40,3 @@ ocil: |-
|
|
|
0cd8e1 |
To verify the audispd's syslog plugin is active, run the following command:
|
|
|
0cd8e1 |
$ sudo grep active /etc/audisp/plugins.d/syslog.conf
|
|
|
0cd8e1 |
If the plugin is active, the output will show <tt>yes</tt>.
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct.rule
|
|
|
0cd8e1 |
index cabdc03..3b45bc2 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_action_mail_acct.rule
|
|
|
0cd8e1 |
@@ -44,4 +44,3 @@ ocil: |-
|
|
|
0cd8e1 |
account when it needs to notify an administrator:
|
|
|
0cd8e1 |
action_mail_acct = root
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action.rule
|
|
|
0cd8e1 |
index 7bad632..46102a1 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_admin_space_left_action.rule
|
|
|
0cd8e1 |
@@ -49,4 +49,3 @@ ocil: |-
|
|
|
0cd8e1 |
or halt when disk space has run low:
|
|
|
0cd8e1 |
admin_space_left_action single
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_flush.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_flush.rule
|
|
|
0cd8e1 |
index 5475a85..a070c4a 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_flush.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_flush.rule
|
|
|
0cd8e1 |
@@ -38,4 +38,3 @@ ocil: |-
|
|
|
0cd8e1 |
Acceptable values are <tt>DATA</tt>, and <tt>SYNC</tt>. The setting is
|
|
|
0cd8e1 |
case-insensitive.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file.rule
|
|
|
0cd8e1 |
index 06ec11d..b123481 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file.rule
|
|
|
0cd8e1 |
@@ -41,4 +41,3 @@ ocil: |-
|
|
|
0cd8e1 |
<tt>$ sudo grep max_log_file /etc/audit/auditd.conf</tt>
|
|
|
0cd8e1 |
max_log_file = 6
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action.rule
|
|
|
0cd8e1 |
index 609ca46..1c90f9e 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_max_log_file_action.rule
|
|
|
0cd8e1 |
@@ -52,4 +52,3 @@ ocil: |-
|
|
|
0cd8e1 |
<tt>$ sudo grep max_log_file_action /etc/audit/auditd.conf</tt>
|
|
|
0cd8e1 |
max_log_file_action <tt>rotate</tt>
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs.rule
|
|
|
0cd8e1 |
index 5b1debc..619b19e 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_num_logs.rule
|
|
|
0cd8e1 |
@@ -40,4 +40,3 @@ ocil: |-
|
|
|
0cd8e1 |
<tt>$ sudo grep num_logs /etc/audit/auditd.conf</tt>
|
|
|
0cd8e1 |
num_logs = 5
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left.rule
|
|
|
0cd8e1 |
index d86ae02..c6fd4ea 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left.rule
|
|
|
0cd8e1 |
@@ -40,4 +40,3 @@ ocil: |-
|
|
|
0cd8e1 |
determine if the system is configured correctly:
|
|
|
0cd8e1 |
space_left SIZE_in_MB
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action.rule b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action.rule
|
|
|
0cd8e1 |
index 7b4360f..65523e0 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/configure_auditd_data_retention/auditd_data_retention_space_left_action.rule
|
|
|
0cd8e1 |
@@ -58,4 +58,3 @@ ocil: |-
|
|
|
0cd8e1 |
space_left_action
|
|
|
0cd8e1 |
Acceptable values are <tt>email</tt>, <tt>suspend</tt>, <tt>single</tt>, and <tt>halt</tt>.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/grub2_audit_argument.rule b/linux_os/guide/system/auditing/grub2_audit_argument.rule
|
|
|
0cd8e1 |
index 29c451c..68d4f49 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/grub2_audit_argument.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/grub2_audit_argument.rule
|
|
|
0cd8e1 |
@@ -57,5 +57,3 @@ warnings:
|
|
|
0cd8e1 |
On UEFI-based machines, issue the following command as <tt>root</tt>:
|
|
|
0cd8e1 |
~]# grub2-mkconfig -o /boot/efi/EFI/redhat/grub.cfg
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument.rule b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument.rule
|
|
|
0cd8e1 |
index 361a6b9..82cd257 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/grub2_audit_backlog_limit_argument.rule
|
|
|
0cd8e1 |
@@ -49,3 +49,5 @@ warnings:
|
|
|
0cd8e1 |
~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg
|
|
|
0cd8e1 |
{{% endif %}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/auditing/service_auditd_enabled.rule b/linux_os/guide/system/auditing/service_auditd_enabled.rule
|
|
|
0cd8e1 |
index ce32390..058a689 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/auditing/service_auditd_enabled.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/auditing/service_auditd_enabled.rule
|
|
|
0cd8e1 |
@@ -42,4 +42,3 @@ references:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
ocil: '{{{ ocil_service_enabled(service="auditd") }}}'
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
-platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict.rule b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict.rule
|
|
|
0cd8e1 |
index 492d2e7..eb56d1c 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/enable_execshield_settings/sysctl_kernel_kptr_restrict.rule
|
|
|
0cd8e1 |
@@ -17,3 +17,5 @@ references:
|
|
|
0cd8e1 |
anssi: NT28(R23)
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.kptr_restrict", value="1") }}}
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/grub2_vsyscall_argument.rule b/linux_os/guide/system/permissions/restrictions/grub2_vsyscall_argument.rule
|
|
|
0cd8e1 |
index 8773f24..d9d53c2 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/grub2_vsyscall_argument.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/grub2_vsyscall_argument.rule
|
|
|
0cd8e1 |
@@ -47,3 +47,5 @@ warnings:
|
|
|
0cd8e1 |
~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg
|
|
|
0cd8e1 |
{{% endif %}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument.rule b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument.rule
|
|
|
0cd8e1 |
index 9056613..b72c6b5 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_page_poison_argument.rule
|
|
|
0cd8e1 |
@@ -50,3 +50,5 @@ warnings:
|
|
|
0cd8e1 |
~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg
|
|
|
0cd8e1 |
{{% endif %}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument.rule b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument.rule
|
|
|
0cd8e1 |
index ea982ee..970025d 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/poisoning/grub2_slub_debug_argument.rule
|
|
|
0cd8e1 |
@@ -50,3 +50,5 @@ warnings:
|
|
|
0cd8e1 |
~]# grub2-mkconfig -o /boot/efi/EFI/fedora/grub.cfg
|
|
|
0cd8e1 |
{{% endif %}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled.rule b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled.rule
|
|
|
0cd8e1 |
index a8fc871..463cda6 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_kexec_load_disabled.rule
|
|
|
0cd8e1 |
@@ -15,3 +15,4 @@ severity: unknown
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.kexec_load_disabled", value="1") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope.rule b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope.rule
|
|
|
0cd8e1 |
index 67b7ff8..44febe9 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_yama_ptrace_scope.rule
|
|
|
0cd8e1 |
@@ -17,3 +17,4 @@ severity: unknown
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
{{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.yama.ptrace_scope", value="1") }}}
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/selinux/selinux_user_login_roles.rule b/linux_os/guide/system/selinux/selinux_user_login_roles.rule
|
|
|
0cd8e1 |
index 47690e0..65cbf1f 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/selinux/selinux_user_login_roles.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/selinux/selinux_user_login_roles.rule
|
|
|
0cd8e1 |
@@ -54,3 +54,5 @@ ocil: |-
|
|
|
0cd8e1 |
All authorized non-administrative
|
|
|
0cd8e1 |
users must be mapped to the <tt>user_u</tt> role or the appropriate domain
|
|
|
0cd8e1 |
(user_t).
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/software/integrity/fips/group.yml b/linux_os/guide/system/software/integrity/fips/group.yml
|
|
|
0cd8e1 |
index 75916e9..e9ff7cb 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/software/integrity/fips/group.yml
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/software/integrity/fips/group.yml
|
|
|
0cd8e1 |
@@ -14,3 +14,5 @@ description: |-
|
|
|
0cd8e1 |
Security Levels 1, 2, 3, or 4 for use on Red Hat Enterprise Linux.
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
See {{{ weblink(link="http://csrc.nist.gov/publications/PubsFIPS.html") }}} for more information.
|
|
|
0cd8e1 |
+
|
|
|
0cd8e1 |
+platform: machine
|
|
|
0cd8e1 |
diff --git a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode.rule b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode.rule
|
|
|
0cd8e1 |
index c1223d6..4f70107 100644
|
|
|
0cd8e1 |
--- a/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode.rule
|
|
|
0cd8e1 |
+++ b/linux_os/guide/system/software/integrity/fips/grub2_enable_fips_mode.rule
|
|
|
0cd8e1 |
@@ -60,5 +60,3 @@ warnings:
|
|
|
0cd8e1 |
|
|
|
0cd8e1 |
See {{{ weblink(link="http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm") }}}
|
|
|
0cd8e1 |
for a list of FIPS certified vendors.
|
|
|
0cd8e1 |
-
|
|
|
0cd8e1 |
-platform: machine
|