Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
An XCCDF Rule
Description
At a minimum, the audit system should collect the execution of
privileged commands for all users and root. If the auditd
daemon is
configured to use the augenrules
program to read audit rules during
daemon startup (the default), add a line of the following form to a file with
suffix .rules
in the directory /etc/audit/rules.d
:
-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -F key=privilegedIf the
auditd
daemon is configured to use the auditctl
utility to read audit rules during daemon startup, add a line of the following
form to /etc/audit/audit.rules
:
-a always,exit -F path=/usr/sbin/unix_chkpwd -F perm=x -F auid>=1000 -F auid!=unset -F key=privileged
Rationale
Misuse of privileged functions, either intentionally or unintentionally by
authorized users, or by unauthorized external entities that have compromised system accounts,
is a serious and ongoing concern and can have significant adverse impacts on organizations.
Auditing the use of privileged functions is one way to detect such misuse and identify
the risk from insider and advanced persistent threats.
Privileged programs are subject to escalation-of-privilege attacks,
which attempt to subvert their normal role of providing some necessary but
limited capability. As such, motivation exists to monitor these programs for
unusual activity.
- ID
- xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd
- Severity
- Medium
- References
- Updated
Remediation - Kubernetes Patch
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
ignition: