-
Notifications
You must be signed in to change notification settings - Fork 766
Update rules related to /var/log/audit #14286
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This rule description wasn't aligned with OVAL and remediations. There were product specific conditions that aren't justified. In this commit the code has been consolidated so that it works the same on all platforms. Inconsistencies have been removed and clarified. Special OVAL for SLES 15 has been merged into the generic OVAL. Ansible remediation has been simplified and aligned with the Bash remediation. Finally, all test scenarios have been reworked. Resolves: https://issues.redhat.com/browse/RHEL-138549
|
Skipping CI for Draft Pull Request. |
This rule description wasn't aligned with OVAL and remediations. There were product specific conditions that aren't justified. In this commit the code has been consolidated so that it works the same on all platforms. Inconsistencies have been removed and clarified. Ansible remediation has been simplified and aligned with the Bash remediation. Finally, test scenarios have been reworked. Resolves: https://issues.redhat.com/browse/RHEL-138549
500a47c to
445b25f
Compare
ATEX Test ResultsTest artifacts have been submitted to Testing Farm. Results: View Test Results This comment was automatically generated by the ATEX workflow. |
|
I have confirmed that this PR fixes the linked issue https://issues.redhat.com/browse/RHEL-138549 therefore I will mark this as ready for review. |
Mab879
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should linux_os/guide/auditing/auditd_configure_rules/file_permissions_var_log_audit/bash/shared.sh still lists all of the platforms?
linux_os/guide/auditing/auditd_configure_rules/file_permissions_var_log_audit/rule.yml
Outdated
Show resolved
Hide resolved
...x_os/guide/auditing/auditd_configure_rules/file_permissions_var_log_audit/ansible/shared.yml
Outdated
Show resolved
Hide resolved
linux_os/guide/auditing/auditd_configure_rules/file_permissions_var_log_audit/bash/shared.sh
Outdated
Show resolved
Hide resolved
| documentation_complete: true | ||
|
|
||
|
|
||
| title: 'System Audit Logs Must Have Mode 0640 or Less Permissive' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is 640 or 600?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
0640 or less permissive
0600 if the log_group is root
0640 if the log_group isn't root
I updated the rule description, it was confusing
..._os/guide/auditing/auditd_configure_rules/directory_permissions_var_log_audit/bash/shared.sh
Outdated
Show resolved
Hide resolved
Minor changes based on the PR review
|
I have updated the PR according to your feedback |
Fix rules fix_permissions_var_log_audit and directory_permissions_var_log_audit.
This rule description wasn't aligned with OVAL and remediations. There
were product specific conditions that aren't justified. In this commit
the code has been consolidated so that it works the same on all
platforms. Inconsistencies have been removed and clarified. Ansible
remediation has been simplified and aligned with the Bash remediation.
Finally, test scenarios have been reworked.
Resolves: https://issues.redhat.com/browse/RHEL-138549