TOSS must generate audit records containing the full-text recording of privileged commands.
An XCCDF Rule
Description
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.
- ID
- SV-252974r958422_rule
- Version
- TOSS-04-030060
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "sudo" command by adding or updating the following rule in the "/etc/audit/rules.d/audit.rules" file:
-a always,exit -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=unset -k priv_cmd
The audit daemon must be restarted for the changes to take effect.