![Major Hayden](/assets/img/avatar_default.png)
This patch gets rid of the old "special notes" section that was a dead-end in the documentation and replaces it with a brief header followed by a dynamically-generated list of tag-specific documentation. All of this sits underneath the "Hardening Domains" section. It also splits the "Deviations" documentation into its own section because it's quite important for a deployer to review. The patch also includes a link to video/slides from the Boston Summit, which provided the latest updates for the project and some background on how everything fits together. Change-Id: I1a5e78733c301335fe1bcfcee36cc146d690b841
49 lines
2.0 KiB
ReStructuredText
49 lines
2.0 KiB
ReStructuredText
auditd - audit daemon
|
|
=====================
|
|
|
|
The STIG requires all systems to have the audit daemon, ``auditd``, running to
|
|
monitor system calls and other critical events. The daemon has rules that
|
|
define which events are noteworthy on the system and it can generate alerts
|
|
based on the events it finds.
|
|
|
|
Overview
|
|
--------
|
|
|
|
Audit daemon rules
|
|
The auditd rules are deployed in a single task via a template
|
|
(``templates/osas-auditd-rhel7.j2``). Each rule or set of similar rules are
|
|
controlled by an Ansible variable that starts with ``security_audit_rhel7``.
|
|
Refer to ``defaults/main.yml`` for a list of these variables.
|
|
|
|
Example:
|
|
|
|
.. code-block:: yaml
|
|
|
|
# Add audit rules for commands/syscalls.
|
|
security_rhel7_audit_chsh: yes # V-72167
|
|
security_rhel7_audit_chage: yes # V-72155
|
|
security_rhel7_audit_chcon: yes # V-72139
|
|
security_rhel7_audit_chmod: no # V-72105
|
|
security_rhel7_audit_chown: no # V-72097
|
|
|
|
For example, setting ``security_rhel7_audit_chown`` to ``yes`` will
|
|
ensure that the rule for auditing the usage of the ``chown`` are included
|
|
on each host. Setting ``security_rhel7_audit_chown`` to ``no`` will omit that
|
|
rule on each host.
|
|
|
|
Handling audit emergencies
|
|
There are several configurations for auditd which are critical for deployers
|
|
to review in detail. The options beneath the ``## Audit daemon (auditd)``
|
|
comment will change how auditd handles log files and what it should do in
|
|
case of emergencies.
|
|
|
|
.. warning::
|
|
|
|
Deployers should thoroughly test all changes to auditd emergency
|
|
configurations. Some of these configuration options can cause serious
|
|
issues on production systems, ranging from a reduction in security to
|
|
servers going offline unexpectedly. There is extensive documentation in the
|
|
developer notes below for each STIG requirement.
|
|
|
|
.. include:: auto_auditd.rst
|