8000 OPENSCAP-4913 - Update audit_file_deletion_events group for RHEL 10 by jan-cerny · Pull Request #13179 · ComplianceAsCode/content · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

OPENSCAP-4913 - Update audit_file_deletion_events group for RHEL 10 #13179

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Mar 20, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions components/audit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -106,6 +106,7 @@ rules:
- audit_rules_file_deletion_events
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/anssi.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1559,6 +1559,7 @@ controls:

- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/cis_rhel10.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2628,6 +2628,7 @@ controls:
rules:
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat

Expand Down
7 changes: 7 additions & 0 deletions controls/hipaa.yml
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -236,6 +237,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -432,6 +434,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -1166,6 +1169,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -1306,6 +1310,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -1476,6 +1481,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- 10000 audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down Expand Up @@ -1574,6 +1580,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/pcidss_4.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2769,6 +2769,7 @@ controls:
rules:
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000037-GPOS-00015.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000042-GPOS-00020.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000062-GPOS-00031.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000392-GPOS-00172.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000462-GPOS-00206.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000466-GPOS-00210.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ controls:
- audit_rules_execution_chacl
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000467-GPOS-00211.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ controls:
rules:
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000468-GPOS-00212.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ controls:
- audit_rules_execution_chcon
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
1 change: 1 addition & 0 deletions controls/srg_gpos/SRG-OS-000471-GPOS-00215.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ controls:
- audit_rules_execution_setsebool
- audit_rules_file_deletion_events_rename
- audit_rules_file_deletion_events_renameat
- audit_rules_file_deletion_events_renameat2
- audit_rules_file_deletion_events_rmdir
- audit_rules_file_deletion_events_unlink
- audit_rules_file_deletion_events_unlinkat
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ do
ACTION_ARCH_FILTERS="-a always,exit -F arch=$ARCH"
OTHER_FILTERS=""
AUID_FILTERS="-F auid>={{{ auid }}} -F auid!=unset"
SYSCALL="rmdir unlink unlinkat rename renameat"
SYSCALL="rmdir unlink unlinkat rename renameat renameat2"
KEY="delete"
SYSCALL_GROUPING="rmdir unlink unlinkat rename renameat"
SYSCALL_GROUPING="rmdir unlink unlinkat rename renameat renameat2"
# Perform the remediation for both possible tools: 'auditctl' and 'augenrules'
{{{ bash_fix_audit_syscall_rule("augenrules", "$ACTION_ARCH_FILTERS", "$OTHER_FILTERS", "$AUID_FILTERS", "$SYSCALL", "$SYSCALL_GROUPING", "$KEY") }}}
{{{ bash_fix_audit_syscall_rule("auditctl", "$ACTION_ARCH_FILTERS", "$OTHER_FILTERS", "$AUID_FILTERS", "$SYSCALL", "$SYSCALL_GROUPING", "$KEY") }}}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
<extend_definition comment="audit unlinkat" definition_ref="audit_rules_file_deletion_events_unlinkat" />
<extend_definition comment="audit rename" definition_ref="audit_rules_file_deletion_events_rename" />
<extend_definition comment="audit renameat" definition_ref="audit_rules_file_deletion_events_renameat" />
<extend_definition comment="audit renameat2" definition_ref="audit_rules_file_deletion_events_renameat2" />
</criteria>
</definition>

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,14 +8,14 @@ description: |-
for all users and root. If the <tt>auditd</tt> daemon is configured to use the
<tt>augenrules</tt> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <tt>.rules</tt> in the
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 or b64 as
appropriate for your system:
<pre>-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat,renameat2 -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>
If the <tt>auditd</tt> daemon is configured to use the <tt>auditctl</tt>
utility to read audit rules during daemon startup, add the following line to
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<pre>-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename -S renameat -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat2 -S renameat -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>

rationale: |-
Auditing file deletions will create an audit trail for files that are removed
Expand Down Expand Up @@ -50,6 +50,7 @@ ocil: |-
{{{ ocil_audit_syscall(syscall="unlinkat") }}}
{{{ ocil_audit_syscall(syscall="rename") }}}
{{{ ocil_audit_syscall(syscall="renameat") }}}
{{{ ocil_audit_syscall(syscall="renameat2") }}}

{{{ ocil_clause_entry_audit_syscall() }}}

Expand All @@ -62,5 +63,8 @@ warnings:
<li><tt>audit_rules_file_deletion_events_rmdir</tt></li>
<li><tt>audit_rules_file_deletion_events_unlink</tt></li>
<li><tt>audit_rules_file_deletion_events_unlinkat</tt></li>
<li><tt>audit_rules_file_deletion_events_rename</tt></li>
<li><tt>audit_rules_file_deletion_events_renameat</tt></li>
<li><tt>audit_rules_file_deletion_events_renameat2</tt></li>
</ul>

Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
srg_requirement: |-
{{{ full_name }}} must audit all uses of the rename,unlink,rmdir,renameat, and unlinkat system calls.
{{{ full_name }}} must audit all uses of the rename,unlink,rmdir,renameat,renameat2 and unlinkat system calls.

vuldiscussion: |-
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Expand All @@ -11,19 +11,19 @@ vuldiscussion: |-
The system call rules are loaded into a matching engine that intercepts each syscall made by all programs on the system. Therefore, it is very important to use syscall rules only when absolutely necessary since these affect performance. The more rules, the bigger the performance hit. The performance can be helped, however, by combining syscalls into one rule whenever possible.

checktext: |-
Verify that {{{ full_name }}} is configured to audit successful/unsuccessful attempts to use the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls with the following command:
Verify that {{{ full_name }}} is configured to audit successful/unsuccessful attempts to use the "rename", "unlink", "rmdir", "renameat", "renameat2", and "unlinkat" system calls with the following command:

$ sudo auditctl -l | grep 'rename\|unlink\|rmdir'

-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,renameat2,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,renameat2,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete

If the command does not return an audit rule for "rename", "unlink", "rmdir", "renameat", and "unlinkat" or any of the lines returned are commented out, this is a finding.

fixtext: |-
Configure {{{ full_name }}} to generate an audit event for any successful/unsuccessful use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file:
Configure {{{ full_name }}} to generate an audit event for any successful/unsuccessful use of the "rename", "unlink", "rmdir", "renameat", "renameat2", and "unlinkat" system calls by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file:

-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b32 -S rename,unlink,rmdir,renameat,renameat2,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b64 -S rename,unlink,rmdir,renameat,renameat2,unlinkat -F auid&gt;={{{ uid_min }}} -F auid!=unset -k delete

The audit daemon must be restarted for the changes to take effect.
Original file line number Diff line number Diff line change
Expand Up @@ -7,13 +7,13 @@ description: |-
for all users and root. If the <tt>auditd</tt> daemon is configured to use the
<tt>augenrules</tt> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <tt>.rules</tt> in the
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 or b64 as
appropriate for your system:
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S rename -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>
If the <tt>auditd</tt> daemon is configured to use the <tt>auditctl</tt>
utility to read audit rules during daemon startup, add the following line to
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S rename -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>

rationale: |-
Expand Down Expand Up @@ -70,6 +70,7 @@ template:
- unlinkat
- rename
- renameat
- renameat2
- rmdir

fixtext: |-
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,13 +7,13 @@ description: |-
for all users and root. If the <tt>auditd</tt> daemon is configured to use the
<tt>augenrules</tt> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <tt>.rules</tt> in the
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 or b64 as
appropriate for your system:
directory <tt>/etc/audit/rules.d</tt>, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S renameat -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>
If the <tt>auditd</tt> daemon is configured to use the <tt>auditctl</tt>
utility to read audit rules during daemon startup, add the following line to
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 or b64 as
appropriate for your system:
<tt>/etc/audit/audit.rules</tt> file, setting ARCH to either b32 for 32-bit
system, or having two lines for both b32 and b64 in case your system is 64-bit:
<pre>-a always,exit -F arch=ARCH -S renameat -F auid&gt;={{{ auid }}} -F auid!=unset -F key=delete</pre>

rationale: |-
Expand Down Expand Up @@ -67,6 +67,7 @@ template:
- unlinkat
- rename
- renameat
- renameat2
- rmdir
fixtext: |-
{{{ fixtext_audit_rules_file_deletion_events("renameat") | indent(4) }}}
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
srg_requirement: |-
Successful/unsuccessful uses of the renameat2 system call in {{{ full_name }}} must generate an audit record.

vuldiscussion: |-
Auditing file deletions will create an audit trail for files that are removed
from the system. The audit trail could aid in system troubleshooting, as well as, detecting
malicious processes that attempt to delete log files to conceal their presence.

checktext: |-
To determine if the system is configured to audit calls to the
renameat2 system call, run the following command:
$ sudo grep "renameat2" /etc/audit/audit.*
If the system is configured to audit this activity, it will return a line.


If no line is returned, then this is a finding.

fixtext: |-
Configure the audit system to generate an audit event for any successful/unsuccessful use of the "renameat2" system call by adding or updating the following rules in the "/etc/audit/rules.d/audit.rules" file:
-a always,exit -F arch=b32 -S renameat2 -F auid>={{{ uid_min }}} -F auid!=unset -k delete
-a always,exit -F arch=b64 -S renameat2 -F auid>={{{ uid_min }}} -F auid!=unset -k delete

It's allowed to group this system call within the same line as "rename", "unlink", "rmdir", "renameat2", and "unlinkat".

The audit daemon must be restarted for the changes to take effect.
Loading
Loading
0