Merge "[Docs] Audit rules"

This commit is contained in:
Jenkins
2016-11-13 22:20:52 +00:00
committed by Gerrit Code Review
31 changed files with 332 additions and 93 deletions

View File

@@ -1,7 +1,13 @@
---
id: RHEL-07-030492
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time an account is accessed.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_account_access: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030510
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``passwd`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_passwd_command: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030511
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``unix_chkpwd`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_unix_chkpwd: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030512
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``gpasswd`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_gpasswd: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030513
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``chage`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_chage: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030514
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``userhelper`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_userhelper: no

View File

@@ -1,7 +1,13 @@
---
id: RHEL-07-030521
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``su`` command is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_su: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030522
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``sudo`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_sudo: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030523
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time a user manages the
configuration files for ``sudo``.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_sudo_config_changes: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030524
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``newgrp`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_newgrp: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030525
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``chsh`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_chsh: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030526
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``sudoedit`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_sudoedit: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030530
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``mount`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_mount: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030531
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``umount`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_umount: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030540
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``postdrop`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_postdrop: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030541
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``postqueue`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_postqueue: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030550
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``ssh-keysign`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_ssh_keysign: no

View File

@@ -1,7 +1,18 @@
---
id: RHEL-07-030560
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``pt_chown`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_pt_chown: no
.. note::
No action is taken on Ubuntu 16.04 because ``pt_chown`` is not available.

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030561
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``crontab`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_crontab: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030630
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``pam_timestamp_check``
command is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_pam_timestamp_check: no

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030670
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``init_module`` command
is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_init_module: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030671
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``delete_module``
command is used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_delete_module: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030672
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``insmod`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_insmod: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030673
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``rmmod`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_rmmod: no

View File

@@ -1,7 +1,14 @@
---
id: RHEL-07-030674
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``modprobe`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_modprobe: no

View File

@@ -1,7 +1,20 @@
---
id: RHEL-07-030710
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time that an account is modified.
This includes changes to the following files:
* ``/etc/group``
* ``/etc/passwd``
* ``/etc/gshadow``
* ``/etc/shadow``
* ``/etc/security/opasswd``
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_account_actions: no

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030750
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``rename`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_rename: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030751
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``renameat`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_renameat: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030752
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``rmdir`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_rmdir: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030753
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``unlink`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_unlink: no
This rule is compatible with x86, x86_64, and ppc64 architectures.

View File

@@ -1,7 +1,16 @@
---
id: RHEL-07-030754
status: not implemented
tag: misc
status: implemented
tag: auditd
---
This STIG requirement is not yet implemented.
The tasks add a rule to auditd that logs each time the ``unlinkat`` command is
used.
Deployers can opt-out of this change by setting an Ansible variable:
.. code-block:: yaml
security_rhel7_audit_unlinkat: no
This rule is compatible with x86, x86_64, and ppc64 architectures.