TYVM for the reply and suggestion

Jeff

On Tue, Jan 7, 2025 at 4:46 AM Vojtech Polasek <vpola...@redhat.com> wrote:

> Hello Jeff,
>
> hapy new year. What you describe in the last message seems more like "best
> practices" rather than "compliance" to me.
>
> I think you could get more answers on some audit specific mailing list in
> this case.
>
> Best regards,
>
> Vojtech Polasek
>
>
> Dne 15. 12. 24 v 13:02 Jeff Walzer napsal(a):
>
> Vojtech,
>
> TYVM for the reply.
>
> I was thinking more along the lines of trying to meet best auditd logging
> practices in general say from the RedHat doc (
> https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/security_hardening/auditing-the-system_security-hardening#linux-audit_auditing-the-system)
> that would capture auditing best practices, using that doc to crosswalk the
> use cases to the relevant auditd rule.
>
> Jeff
>
> On Tue, Dec 3, 2024 at 5:08 AM Vojtech Polasek <vpola...@redhat.com>
> wrote:
>
>> Hello Jeff,
>>
>> what compliance requirements do you have in mind?
>>
>> Something specific (STIG, CIS)? Or something more general?
>>
>> This information would help me to give you possibly some answer.
>>
>> Best regards,
>>
>> Vojtech Polasek
>>
>>
>>
>> Dne 26. 11. 24 v 17:50 Jeff Walzer via scap-security-guide napsal(a):
>>
>> Joe
>>
>> Thanks for the tip on dropping the 'b32'-based rules on all systems where
>> you are exclusively using a 64 bit OS and 64 bit libraries.
>>
>> Jeff
>>
>> On Tue, Nov 26, 2024 at 10:57 AM Joe Wulf <joe_w...@yahoo.com> wrote:
>>
>>> Recommend dropping all the 'b32'-based rules on all systems where you
>>> are exclusively using a 64 bit OS and 64 bit libraries.
>>>
>>> Would be nice if the DISA STIGs modernized their audit rules mandates to
>>> take this into account as well as optimizations to blend audit rules
>>> together appropriately (for system and auditing efficiency).  This link is
>>> relevant:
>>> https://www.linuxquestions.org/questions/red-hat-31/are-seperate-audit-rules-entries-for-32-and-64-bit-architecture-nessissary-4175465001
>>>
>>> Thank you.
>>> R,
>>> -Joe
>>>
>>>
>>>
>>> On Tuesday, November 26, 2024 at 10:29:02 AM EST, Jeff Walzer via
>>> scap-security-guide <scap-security-guide@lists.fedorahosted.org> wrote:
>>>
>>> I am reviewing the auditd rules here
>>> <https://github.com/linux-audit/audit-userspace/blob/master/rules/30-ospp-v42.rules>,
>>> and for example the rules block below lists the rules for Group add delete
>>> modify:
>>>
>>> ## Group add delete modify. This is covered by pam. However, someone
>>> could
>>> ## open a file and directly create or modify a user, so we'll watch
>>> group and
>>> ## gshadow for writes
>>> -a always,exit -F arch=b32 -F path=/etc/passwd -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=user-modify
>>> -a always,exit -F arch=b64 -F path=/etc/passwd -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=user-modify
>>> -a always,exit -F arch=b32 -F path=/etc/shadow -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=user-modify
>>> -a always,exit -F arch=b64 -F path=/etc/shadow -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=user-modify
>>> -a always,exit -F arch=b32 -F path=/etc/group -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=group-modify
>>> -a always,exit -F arch=b64 -F path=/etc/group -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=group-modify
>>> -a always,exit -F arch=b32 -F path=/etc/gshadow -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=group-modify
>>> -a always,exit -F arch=b64 -F path=/etc/gshadow -F perm=wa -F auid>=1000
>>> -F auid!=unset -F key=group-modify
>>>
>>> I was looking to see if there was a doc that lists the individual auditd
>>> rules and the compliance requirement it would validate. So taking those
>>> rules above and dumping them into a spreadsheet as follows:
>>>
>>> User and Group Management Events
>>> Compliance Requirement Rules
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b32 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=user-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b64 -F path=/etc/passwd -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=user-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b32 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=user-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b64 -F path=/etc/shadow -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=user-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b32 -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=group-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b64 -F path=/etc/group -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=group-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b32 -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=group-modify
>>> Group/Role Add, Delete, Modify (Success/Failure) -a always,exit -F
>>> arch=b64 -F path=/etc/gshadow -F perm=wa -F auid>=1000 -F auid!=unset -F
>>> key=group-modify
>>>
>>> Basically a mapping of compliance requirements and the rules associated
>>> that would be used to validate the compliance requirement.
>>>
>>> Thx
>>> --
>>> _______________________________________________
>>> scap-security-guide mailing list --
>>> scap-security-guide@lists.fedorahosted.org
>>> To unsubscribe send an email to
>>> scap-security-guide-le...@lists.fedorahosted.org
>>> Fedora Code of Conduct:
>>> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
>>> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
>>> List Archives:
>>> https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
>>> Do not reply to spam, report it:
>>> https://pagure.io/fedora-infrastructure/new_issue
>>>
>>
>>
-- 
_______________________________________________
scap-security-guide mailing list -- scap-security-guide@lists.fedorahosted.org
To unsubscribe send an email to scap-security-guide-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/scap-security-guide@lists.fedorahosted.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to