Ensure auditd Collects Information on the Use of Privileged Commands
An XCCDF Rule
Description
The audit system should collect information about usage of privileged commands for all users. These are commands with suid or sgid bits on and they are specially risky in local block device partitions not mounted with noexec and nosuid options. Therefore, these partitions should be first identified by the following command:
findmnt -n -l -k -it $(awk '/nodev/ { print $2 }' /proc/filesystems | paste -sd,) | grep -Pv "noexec|nosuid"For all partitions listed by the previous command, it is necessary to search for setuid / setgid programs using the following command:
$ sudo find PARTITION -xdev -perm /6000 -type f 2>/dev/nullFor each setuid / setgid program identified by the previous command, an audit rule must be present in the appropriate place using the following line structure:
-a always,exit -F path=PROG_PATH -F perm=x -F auid>=1000 -F auid!=unset -F key=privilegedIf the
auditd
daemon is configured to use the augenrules
program to read
audit rules during daemon startup, add the line to a file with suffix .rules
in the
/etc/audit/rules.d
directory, replacing the PROG_PATH part with the full path
of that setuid / setgid identified program.
If the auditd
daemon is configured to use the auditctl
utility instead, add
the line to the /etc/audit/audit.rules
file, also replacing the PROG_PATH part
with the full path of that setuid / setgid identified program.
warning alert: Warning
audit_rules_privileged_commands_su
audit_rules_privileged_commands_umount
audit_rules_privileged_commands_passwd
warning alert: Warning
/proc
directory
and its subdirectories. It is a virtual file system and it doesn't
contain executable applications. At the same time, interacting with this
file system during check or remediation caused undesirable errors.Rationale
Misuse of privileged functions, either intentionally or unintentionally by authorized users,
or by unauthorized external entities that have compromised system accounts, is a serious and
ongoing concern that can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify the
risk from insider and advanced persistent threats.
Privileged programs are subject to escalation-of-privilege attacks, which attempt to subvert
their normal role of providing some necessary but limited capability. As such, motivation
exists to monitor these programs for unusual activity.
- ID
- xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands
- Severity
- Medium
- References
- Updated