Skip to content

Instantly share code, notes, and snippets.

@naavveenn
Last active October 12, 2017 09:11
Show Gist options
  • Save naavveenn/78976f1ff6fa46093a17b93778305a15 to your computer and use it in GitHub Desktop.
Save naavveenn/78976f1ff6fa46093a17b93778305a15 to your computer and use it in GitHub Desktop.
#Audit Logs
apt-get install auditd audispd-plugins -y
systemctl enable auditd
#Ensure audit logs are not automatically deleted
echo ""max_log_file_action = keep_logs"" >> /etc/audit/auditd.conf
#Ensure events that modify date and time information are collected
echo ""-a always,exit -F arch=b64 -S adjtimex -S settimeofday -k time-change"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S adjtimex -S settimeofday -S stime -k time-change"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b64 -S clock_settime -k time-change"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S clock_settime -k time-change"" >> /etc/audit/audit.rules
echo ""-w /etc/localtime -p wa -k time-change"" >> /etc/audit/audit.rules
#Ensure events that modify user/group information are collected###
echo ""-w /etc/group -p wa -k identity"" >> /etc/audit/audit.rules
echo ""-w /etc/passwd -p wa -k identity"" >> /etc/audit/audit.rules
echo ""-w /etc/gshadow -p wa -k identity"" >> /etc/audit/audit.rules
echo ""-w /etc/shadow -p wa -k identity"" >> /etc/audit/audit.rules
echo ""-w /etc/shadow -p wa -k identity"" >> /etc/audit/audit.rules
echo ""-w /etc/security/opasswd -p wa -k identity"" >> /etc/audit/audit.rules
#Ensure events that modify the system's network environment are collected##
echo ""-a always,exit -F arch=b64 -S sethostname -S setdomainname -k system-locale"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S sethostname -S setdomainname -k system-locale"" >> /etc/audit/audit.rules
echo ""-w /etc/issue -p wa -k system-locale"" >> /etc/audit/audit.rules
echo ""-w /etc/issue.net -p wa -k system-locale"" >> /etc/audit/audit.rules
echo ""-w /etc/hosts -p wa -k system-locale"" >> /etc/audit/audit.rules
echo ""-w /etc/network -p wa -k system-locale"" >> /etc/audit/audit.rules
echo ""-w /etc/networks -p wa -k system-locale"" >> /etc/audit/audit.rules
#Ensure events that modify the system's Mandatory Access Controls are collected##
echo ""-w /etc/selinux/ -p wa -k MAC-policy"" >> /etc/audit/audit.rules
echo ""-w /etc/apparmor/ -p wa -k MAC-policy"" >> /etc/audit/audit.rules
echo ""-w /etc/apparmor.d/ -p wa -k MAC-policy"" >> /etc/audit/audit.rules
#Ensure login and logout events are collected###
echo ""-w /var/log/faillog -p wa -k logins"" >> /etc/audit/audit.rules
echo ""-w /var/log/lastlog -p wa -k logins"" >> /etc/audit/audit.rules
echo ""-w /var/log/tallylog -p wa -k logins"" >> /etc/audit/audit.rules
#Ensure session initiation information is collected##
echo ""-w /var/run/utmp -p wa -k session"" >> /etc/audit/audit.rules
echo ""-w /var/log/wtmp -p wa -k session"" >> /etc/audit/audit.rules
echo ""-w /var/log/btmp -p wa -k session"" >> /etc/audit/audit.rules
#Ensure discretionary access control permission modifiechoion events are collected##
echo ""-a always,exit -F arch=b64 -S sudo chmod -S fsudo chmod -S fsudo chmodat -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S sudo chmod -S fsudo chmod -S fsudo chmodat -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b64 -S sudo chown -S fsudo chown -S fsudo chownat -S lsudo chown -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S sudo chown -S fsudo chown -S fsudo chownat -S lsudo chown -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b64 -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S setxattr -S lsetxattr -S fsetxattr -S removexattr -S lremovexattr -S fremovexattr -F auid>=1000 -F auid!=4294967295 -k perm_mod"" >> /etc/audit/audit.rules
#Ensure unsuccessful unauthorized file access attempts are collected##
echo ""-a always,exit -F arch=b64 -S creat -S open -S openat -S trunechoe -S ftrunechoe -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k access"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S creat -S open -S openat -S trunechoe -S ftrunechoe -F exit=-EACCES -F auid>=1000 -F auid!=4294967295 -k access"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b64 -S creat -S open -S openat -S trunechoe -S ftrunechoe -F exit=-EPERM -F auid>=1000 -F auid!=4294967295 -k access"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S creat -S open -S openat -S trunechoe -S ftrunechoe -F exit=-EPERM -F auid>=1000 -F auid!=4294967295 -k access"" >> /etc/audit/audit.rules
##Ensure successful file system mounts are collected##
echo ""-a always,exit -F arch=b64 -S mount -F auid>=1000 -F auid!=4294967295 -k mounts"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S mount -F auid>=1000 -F auid!=4294967295 -k mounts"" >> /etc/audit/audit.rules
##Ensure file deletion events by users are collected##
echo ""-a always,exit -F arch=b64 -S unlink -S unlinkat -S rename -S renameat -F auid>=1000 -F auid!=4294967295 -k delete"" >> /etc/audit/audit.rules
echo ""-a always,exit -F arch=b32 -S unlink -S unlinkat -S rename -S renameat -F auid>=1000 -F auid!=4294967295 -k delete"" >> /etc/audit/audit.rules
##Ensure changes to system administration scope (sudoers) is collected##
echo ""-w /etc/sudoers -p wa -k scope"" >> /etc/audit/audit.rules
echo ""-w /etc/sudoers.d -p wa -k scope"" >> /etc/audit/audit.rules
##Ensure system administrator actions (sudolog) are collected##
echo ""-w /var/log/sudo.log -p wa -k actions"" >> /etc/audit/audit.rules
##Ensure kernel module loading and unloading is collected##
echo ""-w /sbin/insmod -p x -k modules"" >> /etc/audit/audit.rules
echo ""-w /sbin/rmmod -p x -k modules"" >> /etc/audit/audit.rules
echo ""-w /sbin/modprobe -p x -k modules"" >> /etc/audit/audit.rules
echo ""-a always,exit arch=b64 -S init_module -S delete_module -k modules"" >> /etc/audit/audit.rules
###Ensure the audit configuration is immutable##
echo ""-e 2"" >> /etc/audit/audit.rules
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment