Skip to content

Commit

Permalink
Add new rules to replace audit_rules_mac_modification on Ubuntu
Browse files Browse the repository at this point in the history
Analogous to PR ComplianceAsCode#12826
  • Loading branch information
mpurg committed Jan 15, 2025
1 parent 6e79ee6 commit 3178636
Show file tree
Hide file tree
Showing 4 changed files with 74 additions and 2,580 deletions.
2 changes: 2 additions & 0 deletions components/audit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -124,6 +124,8 @@ rules:
- audit_rules_login_events_lastlog
- audit_rules_login_events_tallylog
- audit_rules_mac_modification
- audit_rules_mac_modification_etc_apparmor
- audit_rules_mac_modification_etc_apparmor_d
- audit_rules_mac_modification_usr_share
- audit_rules_media_export
- audit_rules_networkconfig_modification
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
documentation_complete: true

title: 'Record Events that Modify the System''s Mandatory Access Controls (/etc/apparmor)'

description: |-
If the <tt>auditd</tt> daemon is configured to use the
<tt>augenrules</tt> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <tt>.rules</tt> in the
directory <tt>/etc/audit/rules.d</tt>:
<pre>-w /etc/apparmor/ -p wa -k MAC-policy</pre>
If the <tt>auditd</tt> daemon is configured to use the <tt>auditctl</tt>
utility to read audit rules during daemon startup, add the following line to
<tt>/etc/audit/audit.rules</tt> file:
<pre>-w /etc/apparmor/ -p wa -k MAC-policy</pre>
rationale: |-
The system's mandatory access policy (Apparmor) should not be
arbitrarily changed by anything other than administrator action. All changes to
MAC policy should be audited.
severity: medium

ocil_clause: 'the system is not configured to audit attempts to change files within the /etc/apparmor directory'

ocil: |-
To determine if the system is configured to audit changes to its Apparmor
configuration files, run the following command:
<pre>$ sudo auditctl -l | grep "dir=/etc/apparmor"</pre>
If the system is configured to watch for changes to its Apparmor
configuration, a line should be returned (including
<tt>perm=wa</tt> indicating permissions that are watched).
template:
name: audit_rules_watch
vars:
path: /etc/apparmor
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
documentation_complete: true

title: 'Record Events that Modify the System''s Mandatory Access Controls (/etc/apparmor.d)'

description: |-
If the <tt>auditd</tt> daemon is configured to use the
<tt>augenrules</tt> program to read audit rules during daemon startup (the
default), add the following line to a file with suffix <tt>.rules</tt> in the
directory <tt>/etc/audit/rules.d</tt>:
<pre>-w /etc/apparmor.d/ -p wa -k MAC-policy</pre>
If the <tt>auditd</tt> daemon is configured to use the <tt>auditctl</tt>
utility to read audit rules during daemon startup, add the following line to
<tt>/etc/audit/audit.rules</tt> file:
<pre>-w /etc/apparmor.d/ -p wa -k MAC-policy</pre>
rationale: |-
The system's mandatory access policy (Apparmor) should not be
arbitrarily changed by anything other than administrator action. All changes to
MAC policy should be audited.
severity: medium

ocil_clause: 'the system is not configured to audit attempts to change files within the /etc/apparmor.d directory'

ocil: |-
To determine if the system is configured to audit changes to its Apparmor
configuration files, run the following command:
<pre>$ sudo auditctl -l | grep "dir=/etc/apparmor.d"</pre>
If the system is configured to watch for changes to its Apparmor
configuration, a line should be returned (including
<tt>perm=wa</tt> indicating permissions that are watched).
template:
name: audit_rules_watch
vars:
path: /etc/apparmor.d
Loading

0 comments on commit 3178636

Please sign in to comment.