Steve, Audit team,

My colleagues and I were discussing ways we might better monitor for  potential 
insider threat.   We can easily see the commands our SAs run when they use sudo 
in front of the command,   but if the  sysadmin uses "sudo su -", then we don't 
have good visibility into the commands they perform while they are su'd unless 
there happens to be an audit rule monitoring the specific files/commands they 
are accessing/running.  

We've talked about possible way to improve our visibility in this situation, 
but most of the options we came up with are easily thwarted and/or would cause 
the logs to blow up to the point that it's difficult to spot  nefarious 
activity.   Some options we considered included having splunk monitor the shell 
history files, and possibly enabling ps auditing.

Can you recommend any audit rules that would audit the interactive commands 
being issued by a sysadmin who is su'd as root without causing the logs to blow 
up?   

Any assistance you can provide would be much appreciated.

Thank you,
Karen Wieprecht 
The Johns Hopkins Applied Physics Laboratory
--
Linux-audit mailing list
Linux-audit@redhat.com
https://listman.redhat.com/mailman/listinfo/linux-audit

Reply via email to