Skip to content

Commit

Permalink
Merge pull request #11920 from mpurg/ubuntu_2204_stig_654190_v2
Browse files Browse the repository at this point in the history
Add new rule audit_rules_var_log_journal
  • Loading branch information
dodys authored May 6, 2024
2 parents 272f371 + fccbc43 commit 3796d75
Show file tree
Hide file tree
Showing 3 changed files with 57 additions and 2 deletions.
1 change: 1 addition & 0 deletions components/audit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -260,6 +260,7 @@ rules:
- audit_rules_usergroup_modification_opasswd
- audit_rules_usergroup_modification_passwd
- audit_rules_usergroup_modification_shadow
- audit_rules_var_log_journal
- audit_sudo_log_events
- auditd_audispd_configure_remote_server
- auditd_audispd_configure_sufficiently_large_partition
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
documentation_complete: true

title: 'Ensure auditd Collects records for events that affect "/var/log/journal"'

description: |-
Auditing the systemd journal files provides logging that can be used for
forensic purposes. Verify the system generates audit records for all events
that affect "/var/log/journal" by using the following command:
<pre>
$ sudo auditctl -l | grep journal
-w /var/log/journal/ -p wa -k systemd_journal
</pre>
If the command does not return a line that matches the example or the line
is commented out, this is a finding.
Note: The "-k" value is arbitrary and can be different from the example
output above.
rationale: |-
Once an attacker establishes access to a system, the attacker often attempts
to create a persistent method of reestablishing access. One way to accomplish
this is for the attacker to modify system level binaries and their operation.
Auditing the systemd journal files provides logging that can be used for
forensic purposes.
severity: medium

references:
disa: CCI-000366
stigid@ubuntu2204: UBTU-22-654190

ocil_clause: 'the command does not return a line, or the line is commented out'

ocil: |-
Verify the system generates audit records for all events
that affect "/var/log/journal" by using the following command:
<pre>
$ sudo auditctl -l | grep journal
-w /var/log/journal/ -p wa -k systemd_journal
</pre>
If the command does not return a line that matches the example or the line
is commented out, this is a finding.
fixtext: '{{{ fixtext_audit_file_watch_rule("/var/log/journal/", "systemd_journal", "/etc/audit/rules.d/audit.rules") }}}'

srg_requirement: '{{{ srg_requirement_audit_file_watch_rule("/var/log/journal/") }}}'

template:
name: audit_rules_watch
vars:
path: /var/log/journal/
3 changes: 1 addition & 2 deletions products/ubuntu2204/profiles/stig.profile
Original file line number Diff line number Diff line change
Expand Up @@ -622,9 +622,8 @@ selections:
# UBTU-22-611055 The Ubuntu operating system must store only encrypted representations of passwords
- set_password_hashing_algorithm_systemauth

### TODO (rule needed)
# Analogous to audit_rules_login_events_lastlog
# UBTU-22-654190 The Ubuntu operating system must generate audit records for all events that affect the systemd journal files
- audit_rules_var_log_journal

### TODO (rule needed)
# Analogous to package_telnetd_removed
Expand Down

0 comments on commit 3796d75

Please sign in to comment.