Merge "[Docs] Audit rules"
This commit is contained in:
@@ -1,7 +1,13 @@
|
||||
---
|
||||
id: RHEL-07-030492
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time an account is accessed.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_account_access: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030510
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``passwd`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_passwd_command: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030511
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``unix_chkpwd`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_unix_chkpwd: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030512
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``gpasswd`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_gpasswd: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030513
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``chage`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_chage: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030514
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``userhelper`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_userhelper: no
|
||||
|
||||
@@ -1,7 +1,13 @@
|
||||
---
|
||||
id: RHEL-07-030521
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``su`` command is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_su: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030522
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``sudo`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_sudo: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030523
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time a user manages the
|
||||
configuration files for ``sudo``.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_sudo_config_changes: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030524
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``newgrp`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_newgrp: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030525
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``chsh`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_chsh: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030526
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``sudoedit`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_sudoedit: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030530
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``mount`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_mount: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030531
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``umount`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_umount: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030540
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``postdrop`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_postdrop: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030541
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``postqueue`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_postqueue: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030550
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``ssh-keysign`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_ssh_keysign: no
|
||||
|
||||
@@ -1,7 +1,18 @@
|
||||
---
|
||||
id: RHEL-07-030560
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``pt_chown`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_pt_chown: no
|
||||
|
||||
.. note::
|
||||
|
||||
No action is taken on Ubuntu 16.04 because ``pt_chown`` is not available.
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030561
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``crontab`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_crontab: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030630
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``pam_timestamp_check``
|
||||
command is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_pam_timestamp_check: no
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030670
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``init_module`` command
|
||||
is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_init_module: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030671
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``delete_module``
|
||||
command is used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_delete_module: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030672
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``insmod`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_insmod: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030673
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``rmmod`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_rmmod: no
|
||||
|
||||
@@ -1,7 +1,14 @@
|
||||
---
|
||||
id: RHEL-07-030674
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``modprobe`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_modprobe: no
|
||||
|
||||
@@ -1,7 +1,20 @@
|
||||
---
|
||||
id: RHEL-07-030710
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time that an account is modified.
|
||||
This includes changes to the following files:
|
||||
|
||||
* ``/etc/group``
|
||||
* ``/etc/passwd``
|
||||
* ``/etc/gshadow``
|
||||
* ``/etc/shadow``
|
||||
* ``/etc/security/opasswd``
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_account_actions: no
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030750
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``rename`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_rename: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030751
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``renameat`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_renameat: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030752
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``rmdir`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_rmdir: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030753
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``unlink`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_unlink: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
@@ -1,7 +1,16 @@
|
||||
---
|
||||
id: RHEL-07-030754
|
||||
status: not implemented
|
||||
tag: misc
|
||||
status: implemented
|
||||
tag: auditd
|
||||
---
|
||||
|
||||
This STIG requirement is not yet implemented.
|
||||
The tasks add a rule to auditd that logs each time the ``unlinkat`` command is
|
||||
used.
|
||||
|
||||
Deployers can opt-out of this change by setting an Ansible variable:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
security_rhel7_audit_unlinkat: no
|
||||
|
||||
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||
|
||||
Reference in New Issue
Block a user