This patch gets rid of the old "special notes" section that was a dead-end in the documentation and replaces it with a brief header followed by a dynamically-generated list of tag-specific documentation. All of this sits underneath the "Hardening Domains" section. It also splits the "Deviations" documentation into its own section because it's quite important for a deployer to review. The patch also includes a link to video/slides from the Boston Summit, which provided the latest updates for the project and some background on how everything fits together. Change-Id: I1a5e78733c301335fe1bcfcee36cc146d690b841
2.0 KiB
auditd - audit daemon
The STIG requires all systems to have the audit daemon,
auditd
, running to monitor system calls and other critical
events. The daemon has rules that define which events are noteworthy on
the system and it can generate alerts based on the events it finds.
Overview
- Audit daemon rules
-
The auditd rules are deployed in a single task via a template (
templates/osas-auditd-rhel7.j2
). Each rule or set of similar rules are controlled by an Ansible variable that starts withsecurity_audit_rhel7
. Refer todefaults/main.yml
for a list of these variables.Example:
# Add audit rules for commands/syscalls. security_rhel7_audit_chsh: yes # V-72167 security_rhel7_audit_chage: yes # V-72155 security_rhel7_audit_chcon: yes # V-72139 security_rhel7_audit_chmod: no # V-72105 security_rhel7_audit_chown: no # V-72097
For example, setting
security_rhel7_audit_chown
toyes
will ensure that the rule for auditing the usage of thechown
are included on each host. Settingsecurity_rhel7_audit_chown
tono
will omit that rule on each host. - Handling audit emergencies
-
There are several configurations for auditd which are critical for deployers to review in detail. The options beneath the
## Audit daemon (auditd)
comment will change how auditd handles log files and what it should do in case of emergencies.Warning
Deployers should thoroughly test all changes to auditd emergency configurations. Some of these configuration options can cause serious issues on production systems, ranging from a reduction in security to servers going offline unexpectedly. There is extensive documentation in the developer notes below for each STIG requirement.