Skip to content

Latest commit

 

History

History
46 lines (36 loc) · 2.61 KB

README.md

File metadata and controls

46 lines (36 loc) · 2.61 KB

Linux-Security-Policy

The Linux Audit system provides a way to track security-relevant information on your system. Based on pre-configured rules, Audit generates log entries to record as much information about the events that are happening on your system as possible. This information is crucial for mission-critical environments to determine the violator of the security policy and the actions they performed. Audit does not provide additional security to your system; rather, it can be used to discover violations of security policies used on your system.

Properly configuring your audit rules is critical to meeting compliance requirements and ensuring that you have the relevant logs to detect security incidents. The following scripts will automatically back up your current audit rules and pull down and configure a larger, more complete list of audit rules. It's recommended that you review the rules prior to implementation to ensure that you aren't duplicating any logging you may already be recieving from other sources, such as a SIEM agent.

The following scripts will automatically configure advanced auditing of changes and modifications to:

  • Date and Time
  • Users and Groups
  • Network Environments
  • Mandatory Access Controls
  • Login and Logout
  • Session Initiation
  • Discretionary Access Controls
  • Unsuccessful Unauthorized File Access Attempts
  • Use of Privleged Commands
  • Successful File System Mounts
  • File Deletion Events by Users
  • System Administration Scope
  • System Administrator Actions
  • Kernel Module Loading and Unloading

CentOS7/RHEL7

curl https://raw.githubusercontent.com/Starke427/Linux-Security-Policy/master/auditd_setup_el7.sh > auditd_setup_el7.sh
chmod 700 auditd_setup_el7.sh
./auditd_setup_el7.sh

Debian8/Ubuntu16

curl https://raw.githubusercontent.com/Starke427/Linux-Security-Policy/master/auditd_setup_ubuntu16.sh > auditd_setup_ubuntu16.sh
chmod 700 auditd_setup_ubuntu16.sh
./auditd_setup_ubuntu16.sh

Compliance Validation

You can further assess your security hardening with Lynis. Lynis is a security auditing tool for systems based on UNIX like Linux, macOS, BSD, and others. It performs an in-depth security scan and runs on the system itself. The primary goal is to test security defenses and provide tips for further system hardening. It will also scan for general system information, vulnerable software packages, and possible configuration issues. Lynis was commonly used by system administrators and auditors to assess the security defenses of their systems.

git clone https://github.com/CISOfy/lynis
cd lynis; ./lynis audit system