
❶
Enable an audit context for system calls related to changing file ownership and
permissions. Depending on the hardware architecture of your system, enable or
disable the
*32
rules. 64-bit systems, like x86_64 and ia64, require the
*32
rules
to be removed.
❷
Enable an audit context for system calls related to file content modification. De-
pending on the hardware architecture of your system, enable or disable the *64
rules. 64-bit systems, like x86_64 and ia64, require the *64 rules to be removed.
❸
Enable an audit context for any directory operation, like creating or removing a
directory.
❹
Enable an audit context for any linking operation, such as symlink, link, unlink,
or rename.
❺
Enable an audit context for any operation related to extended file system attributes.
❻
Enable an audit context for the
mknod
system call, which creates special (device)
files.
❼
Enable an audit context for any mount or umount operation. For the x64_64 archi-
tecture, disable the
umount
rule. For the ia64 architecture, disable the
umount2
rule.
32.4 Monitoring Security
Configuration Files and
Databases
To make sure that your system is not made to do undesired things, track any attempts
to change the cron and at configurations or the lists of scheduled jobs. Tracking any
write access to the user, group, password and login databases and logs helps you iden-
tify any attempts to manipulate your system's user database.
Tracking changes to your system configuration (kernel, services, time, etc.) helps you
spot any attempts of others to manipulate essential functionality of your system. Changes
to the PAM configuration should also be monitored in a secure environment, because
changes in the authentication stack should not be made by anyone other than the admin-
istrator and it should be logged which applications are using PAM and how it is used.
Introducing an Audit Rule Set
427
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......