Joe

Thanks for the tip on dropping the 'b32'-based rules on all systems where
you are exclusively using a 64 bit OS and 64 bit libraries.

Jeff

On Tue, Nov 26, 2024 at 10:57 AM Joe Wulf <joe_w...@yahoo.com> wrote:

> Recommend dropping all the 'b32'-based rules on all systems where you are
> exclusively using a 64 bit OS and 64 bit libraries.
>
> Would be nice if the DISA STIGs modernized their audit rules mandates to
> take this into account as well as optimizations to blend audit rules
> together appropriately (for system and auditing efficiency).  This link is
> relevant:
> https://www.linuxquestions.org/questions/red-hat-31/are-seperate-audit-rules-entries-for-32-and-64-bit-architecture-nessissary-4175465001
>
> Thank you.
> R,
> -Joe
>
>
>
> On Tuesday, November 26, 2024 at 10:29:02 AM EST, Jeff Walzer via
> scap-security-guide <scap-security-guide@lists.fedorahosted.org> wrote:
>
> I am reviewing the auditd rules here
> <https://github.com/linux-audit/audit-userspace/blob/master/rules/30-ospp-v42.rules>,
> and for example the rules block below lists the rules for Group add delete
> modify:
>
> ## Group add delete modify. This is covered by pam. However, someone could
> ## open a file and directly create or modify a user, so we'll watch group
> and
> ## gshadow for writes
> -a always,exit -F arch=b32 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=user-modify
> -a always,exit -F arch=b64 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=user-modify
> -a always,exit -F arch=b32 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=user-modify
> -a always,exit -F arch=b64 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=user-modify
> -a always,exit -F arch=b32 -F path=/etc/group -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=group-modify
> -a always,exit -F arch=b64 -F path=/etc/group -F perm=wa -F auid>=1000 -F
> auid!=unset -F key=group-modify
> -a always,exit -F arch=b32 -F path=/etc/gshadow -F perm=wa -F auid>=1000
> -F auid!=unset -F key=group-modify
> -a always,exit -F arch=b64 -F path=/etc/gshadow -F perm=wa -F auid>=1000
> -F auid!=unset -F key=group-modify
>
> I was looking to see if there was a doc that lists the individual auditd
> rules and the compliance requirement it would validate. So taking those
> rules above and dumping them into a spreadsheet as follows:
>
> User and Group Management Events
> Compliance Requirement Rules
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b32 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=user-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b64 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=user-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b32 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=user-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b64 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=user-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b32 -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=group-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b64 -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=group-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b32 -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=group-modify
> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
> arch=b64 -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F
> key=group-modify
>
> Basically a mapping of compliance requirements and the rules associated
> that would be used to validate the compliance requirement.
>
> Thx
> --
> _______________________________________________
> scap-security-guide mailing list --
> scap-security-guide@lists.fedorahosted.org
> To unsubscribe send an email to
> scap-security-guide-le...@lists.fedorahosted.org
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
> Do not reply to spam, report it:
> https://pagure.io/fedora-infrastructure/new_issue
>
-- 
_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to