Karen,
Quite simply, just monitor execve (in addition to targeted/mandated monitoring) 
as
per
# Process execution
-a always,exit -F arch=b64 -S execve -F auid!=unset -F key=cmds

And within /etc/audit/auditd.conf change
    max_log_file = 8    num_logs = 5to    max_log_file = 32    num_logs = 9
Which caters for an expanded set of /var/log/audit/audit.log files (32 x 9 =
288MB).You would need to send your logs to a central SIEM say every 10-15 
minutes.
Burn AltingPS. I know I have identified b32 arch but the best b32 arch rule now 
for
most modern (and supported Linux) is-a always,exit -F arch=b32 -S all -F 
key=32bit-
abi


On Fri, 2023-01-13 at 22:47 +0000, Wieprecht, Karen M. wrote:
> Steve, Audit team,
> My colleagues and I were discussing ways we might better monitor for  
> potential
> insider threat.   We can easily see the commands our SAs run when they use 
> sudo in
> front of the command,   but if the  sysadmin uses "sudo su -", then we don't 
> have
> good visibility into the commands they perform while they are su'd unless 
> there
> happens to be an audit rule monitoring the specific files/commands they are
> accessing/running.  
> We've talked about possible way to improve our visibility in this situation, 
> but
> most of the options we came up with are easily thwarted and/or would cause the
> logs to blow up to the point that it's difficult to spot  nefarious
> activity.   Some options we considered included having splunk monitor the 
> shell
> history files, and possibly enabling ps auditing.
> Can you recommend any audit rules that would audit the interactive commands 
> being
> issued by a sysadmin who is su'd as root without causing the logs to blow up? 
>   
> Any assistance you can provide would be much appreciated.
> Thank you,Karen Wieprecht The Johns Hopkins Applied Physics Laboratory--Linux-
> audit mailing listlinux-au...@redhat.com
> https://listman.redhat.com/mailman/listinfo/linux-audit
> 
--
Linux-audit mailing list
Linux-audit@redhat.com
https://listman.redhat.com/mailman/listinfo/linux-audit

Reply via email to