Audit

System-Audit mit auditd.

Installation

sudo apt install auditd audispd-plugins

Grundkonfiguration

sudo nano /etc/audit/auditd.conf
log_file = /var/log/audit/audit.log
log_format = RAW
log_group = root
priority_boost = 4
flush = INCREMENTAL
freq = 20
max_log_file = 8
num_logs = 5
max_log_file_action = ROTATE
space_left = 75
space_left_action = SYSLOG
action_mail_acct = root
admin_space_left = 50
admin_space_left_action = SUSPEND
disk_full_action = SUSPEND
disk_error_action = SUSPEND

Audit-Regeln

sudo nano /etc/audit/rules.d/audit.rules
# Lösche alle existierenden Regeln
-D

# Systemaufrufe überwachen
-a always,exit -F arch=b64 -S execve -k exec

# Dateizugriffe überwachen
-w /etc/passwd -p wa -k identity
-w /etc/shadow -p wa -k identity
-w /etc/sudoers -p wa -k identity
-w /etc/group -p wa -k identity

# SSH überwachen
-w /etc/ssh/sshd_config -p wa -k sshd
-w /var/log/auth.log -p wa -k logins

# Netzwerk überwachen
-a always,exit -F arch=b64 -S bind,connect -k network

# Systemzeit überwachen
-a always,exit -F arch=b64 -S adjtimex,settimeofday,stime,time -k time

# Unprivilegierte Promiscuous Sockets
-a always,exit -F arch=b64 -S socket -F a0=1 -k promiscuous

# Überwachung von /etc/hosts
-w /etc/hosts -p wa -k hosts

Regeln aktivieren

sudo augenrules --load

Status prüfen

sudo auditctl -l
sudo auditctl -s

Reports

# Alle Events
sudo ausearch -k exec

# Login-Events
sudo ausearch -k logins

# Netzwerk-Events
sudo ausearch -k network

Service neustarten

sudo systemctl restart auditd
sudo systemctl enable auditd

Zurück zur Sicherheits-Übersicht