mirror of
https://github.com/hardenedlinux/harbian-audit.git
synced 2025-07-31 01:24:58 +02:00
Add auditd rules for 8.1.7 8.1.17 8.1.19 base stig-Ubuntu_16-04_LTS.
This commit is contained in:
parent
8d3737fa43
commit
fa964bc586
@ -17,11 +17,13 @@ HARDENING_LEVEL=4
|
|||||||
ARCH64_AUDIT_PARAMS='-w /sbin/insmod -p x -k modules
|
ARCH64_AUDIT_PARAMS='-w /sbin/insmod -p x -k modules
|
||||||
-w /sbin/rmmod -p x -k modules
|
-w /sbin/rmmod -p x -k modules
|
||||||
-w /sbin/modprobe -p x -k modules
|
-w /sbin/modprobe -p x -k modules
|
||||||
|
-w /bin/kmod -p x -k modules
|
||||||
-a always,exit -F arch=b32 -S init_module -S delete_module -S create_module -S finit_module -k modules
|
-a always,exit -F arch=b32 -S init_module -S delete_module -S create_module -S finit_module -k modules
|
||||||
-a always,exit -F arch=b64 -S init_module -S delete_module -S create_module -S finit_module -k modules'
|
-a always,exit -F arch=b64 -S init_module -S delete_module -S create_module -S finit_module -k modules'
|
||||||
ARCH32_AUDIT_PARAMS='-w /sbin/insmod -p x -k modules
|
ARCH32_AUDIT_PARAMS='-w /sbin/insmod -p x -k modules
|
||||||
-w /sbin/rmmod -p x -k modules
|
-w /sbin/rmmod -p x -k modules
|
||||||
-w /sbin/modprobe -p x -k modules
|
-w /sbin/modprobe -p x -k modules
|
||||||
|
-w /bin/kmod -p x -k modules
|
||||||
-a always,exit -F arch=b32 -S init_module -S delete_module -S create_module -S finit_module -k modules'
|
-a always,exit -F arch=b32 -S init_module -S delete_module -S create_module -S finit_module -k modules'
|
||||||
|
|
||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
@ -14,7 +14,9 @@ set -u # One variable unset, it's over
|
|||||||
|
|
||||||
HARDENING_LEVEL=4
|
HARDENING_LEVEL=4
|
||||||
|
|
||||||
AUDIT_PARAMS='-a always,exit -F path=/usr/lib/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh'
|
AUDIT_PARAMS='-a always,exit -F path=/usr/lib/openssh/ssh-keysign -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh
|
||||||
|
-a always,exit -F path=/usr/bin/ssh-agent -F perm=x -F auid>=1000 -F auid!=4294967295 -k privileged-ssh'
|
||||||
|
|
||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
# This function will be called if the script status is on enabled / audit mode
|
# This function will be called if the script status is on enabled / audit mode
|
||||||
|
@ -16,11 +16,13 @@ HARDENING_LEVEL=4
|
|||||||
|
|
||||||
SELINUX_PKG="selinux-basics"
|
SELINUX_PKG="selinux-basics"
|
||||||
SE_AUDIT_PARAMS='-w /etc/selinux/ -p wa -k MAC-policy
|
SE_AUDIT_PARAMS='-w /etc/selinux/ -p wa -k MAC-policy
|
||||||
-w /usr/share/selinux/ -p wa -k MAC-policy'
|
-w /usr/share/selinux/ -p wa -k MAC-policy
|
||||||
|
-a always,exit -F path=/usr/bin/chcon -F perm=x -F auid>=1000 -F auid!=4294967295 -k perm_chng'
|
||||||
|
|
||||||
APPARMOR_PKG="apparmor"
|
APPARMOR_PKG="apparmor"
|
||||||
AA_AUDIT_PARAMS='-w /etc/apparmor/ -p wa -k MAC-policy
|
AA_AUDIT_PARAMS='-w /etc/apparmor/ -p wa -k MAC-policy
|
||||||
-w /etc/apparmor.d/ -p wa -k MAC-policy'
|
-w /etc/apparmor.d/ -p wa -k MAC-policy
|
||||||
|
-a always,exit -F path=/sbin/apparmor_parser -F perm=x -F auid>=1000 -F auid!=4294967295 -k MAC-policy'
|
||||||
|
|
||||||
FILE='/etc/audit/rules.d/audit.rules'
|
FILE='/etc/audit/rules.d/audit.rules'
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user