Merge "[Docs] Refactor auditd rules"
This commit is contained in:
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030380
|
id: RHEL-07-030380
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``chown`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_chown: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030381
|
id: RHEL-07-030381
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fchown`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fchown: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030382
|
id: RHEL-07-030382
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``lchown`` syscalls are audited, but this change
|
||||||
|
creates a significant increase in logging on most systems. This increase can
|
||||||
|
cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_lchown: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030383
|
id: RHEL-07-030383
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fchownat`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fchownat: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030390
|
id: RHEL-07-030390
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``chmod`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_chmod: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030391
|
id: RHEL-07-030391
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fchmod`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fchmod: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030392
|
id: RHEL-07-030392
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fchmodat`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fchmodat: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030400
|
id: RHEL-07-030400
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``setxattr`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_setxattr: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030401
|
id: RHEL-07-030401
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fsetxattr`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fsetxattr: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030402
|
id: RHEL-07-030402
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``lsetxattr`` syscalls are audited, but this change
|
||||||
|
creates a significant increase in logging on most systems. This increase can
|
||||||
|
cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_lsetxattr: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030403
|
id: RHEL-07-030403
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``removexattr`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_removexattr: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030404
|
id: RHEL-07-030404
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``fremovexattr`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_fremovexattr: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,24 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030405
|
id: RHEL-07-030405
|
||||||
status: not implemented
|
status: opt-in
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The STIG requires that all ``lremovexattr`` syscalls are audited, but this
|
||||||
|
change creates a significant increase in logging on most systems. This increase
|
||||||
|
can cause some systems to run out of disk space for logs.
|
||||||
|
|
||||||
|
.. warning::
|
||||||
|
|
||||||
|
This rule is disabled by default to avoid high CPU usage and disk space
|
||||||
|
exhaustion. Deployers should only enable this rule if they have tested it
|
||||||
|
thoroughly in a non-production environment with system health monitoring
|
||||||
|
enabled.
|
||||||
|
|
||||||
|
Deployers can opt in for this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_lremovexattr: yes
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030420
|
id: RHEL-07-030420
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``creat`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_creat: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030421
|
id: RHEL-07-030421
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``open`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_open: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030422
|
id: RHEL-07-030422
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``openat`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_openat: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030423
|
id: RHEL-07-030423
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``open_by_handle_at`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_open_by_handle_at: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030424
|
id: RHEL-07-030424
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``truncate`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_truncate: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,15 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030425
|
id: RHEL-07-030425
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all ``ftruncate`` syscalls on the system.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_ftruncate: no
|
||||||
|
|
||||||
|
This rule is compatible with x86, x86_64, and ppc64 architectures.
|
||||||
|
@@ -1,7 +1,13 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030441
|
id: RHEL-07-030441
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit any time the the ``semanage`` command is used.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_semanage: no
|
||||||
|
@@ -1,7 +1,13 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030442
|
id: RHEL-07-030442
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit any time the the ``setsebool`` command is used.
|
||||||
|
|
||||||
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_setsebool: no
|
||||||
|
@@ -1,7 +1,14 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030443
|
id: RHEL-07-030443
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The tasks add a rule to auditd that logs each time the ``chcon`` command
|
||||||
|
is used.
|
||||||
|
|
||||||
|
Deployers can opt-out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_chcon: no
|
||||||
|
@@ -1,7 +1,14 @@
|
|||||||
---
|
---
|
||||||
id: RHEL-07-030444
|
id: RHEL-07-030444
|
||||||
status: not implemented
|
status: implemented
|
||||||
tag: misc
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
The tasks add a rule to auditd that logs each time the ``restorecon`` command
|
||||||
|
is used.
|
||||||
|
|
||||||
|
Deployers can opt-out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_restorecon: no
|
||||||
|
@@ -4,4 +4,9 @@ status: not implemented
|
|||||||
tag: misc
|
tag: misc
|
||||||
---
|
---
|
||||||
|
|
||||||
This STIG requirement is not yet implemented.
|
Rules are added to audit all successful and unsuccessful account access events.
|
||||||
|
Deployers can opt out of this change by setting the following Ansible variable:
|
||||||
|
|
||||||
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
security_rhel7_audit_account_access: no
|
||||||
|
@@ -4,10 +4,9 @@ status: implemented
|
|||||||
tag: auditd
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
The tasks add a rule to auditd that logs each time the ``init_module`` command
|
Rules are added to audit all ``init_module`` syscalls on the system.
|
||||||
is used.
|
|
||||||
|
|
||||||
Deployers can opt-out of this change by setting an Ansible variable:
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
.. code-block:: yaml
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
@@ -4,10 +4,9 @@ status: implemented
|
|||||||
tag: auditd
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
The tasks add a rule to auditd that logs each time the ``delete_module``
|
Rules are added to audit all ``delete_module`` syscalls on the system.
|
||||||
command is used.
|
|
||||||
|
|
||||||
Deployers can opt-out of this change by setting an Ansible variable:
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
.. code-block:: yaml
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
@@ -4,10 +4,9 @@ status: implemented
|
|||||||
tag: auditd
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
The tasks add a rule to auditd that logs each time the ``rename`` command is
|
Rules are added to audit all ``rename`` syscalls on the system.
|
||||||
used.
|
|
||||||
|
|
||||||
Deployers can opt-out of this change by setting an Ansible variable:
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
.. code-block:: yaml
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
@@ -4,10 +4,9 @@ status: implemented
|
|||||||
tag: auditd
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
The tasks add a rule to auditd that logs each time the ``renameat`` command is
|
Rules are added to audit all ``renameat`` syscalls on the system.
|
||||||
used.
|
|
||||||
|
|
||||||
Deployers can opt-out of this change by setting an Ansible variable:
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
.. code-block:: yaml
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
@@ -4,10 +4,9 @@ status: implemented
|
|||||||
tag: auditd
|
tag: auditd
|
||||||
---
|
---
|
||||||
|
|
||||||
The tasks add a rule to auditd that logs each time the ``rmdir`` command is
|
Rules are added to audit all ``rmdir`` syscalls on the system.
|
||||||
used.
|
|
||||||
|
|
||||||
Deployers can opt-out of this change by setting an Ansible variable:
|
Deployers can opt out of this change by setting an Ansible variable:
|
||||||
|
|
||||||
.. code-block:: yaml
|
.. code-block:: yaml
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user