Puppet Class: auditd::config::audit_profiles::stig
- Defined in:
- manifests/config/audit_profiles/stig.pp
Summary
A set of audit rules that are configured to satisfy DISA STIG compliance checks for EL7.Overview
The defaults for this profile generate a set of audit rules that conform to automated DISA STIG compliance checks for RHEL7. Satisfying the checks, instead of the intent of the security requirements, necessitates unoptimized rules. These unoptimized rules, in turn, negatively impact system performance.
WARNING: **These rules may overload your system and/or log server!**
When auditd performance is an issue, you may wish to
-
Disable capabilities that, despite being required by DISA STIG for RHEL7, produce large amounts audit records of limited utility. ‘chmod` auditing for all non-service users falls in this category.
-
Use the optimized ‘auditd::config::audit_profiles::simp’ profile, instead. That profile is more comprehensive and performant.
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 |
# File 'manifests/config/audit_profiles/stig.pp', line 163
class auditd::config::audit_profiles::stig (
Integer[0] $uid_min = $::auditd::uid_min,
Boolean $audit_unsuccessful_file_operations = true,
String[1] $audit_unsuccessful_file_operations_tag = 'access',
Boolean $audit_chown = true,
String[1] $audit_chown_tag = 'perm_mod',
Boolean $audit_chmod = true,
String[1] $audit_chmod_tag = 'perm_mod',
Boolean $audit_attr = true,
String[1] $audit_attr_tag = 'perm_mod',
Boolean $audit_rename_remove = true,
String[1] $audit_rename_remove_tag = 'delete',
Boolean $audit_suid_sgid = true,
Array[String[1]] $default_suid_sgid_cmds, #data in modules
Array[String[1]] $suid_sgid_cmds = [],
String[1] $audit_suid_tag = 'setuid',
String[1] $audit_sgid_tag = 'setgid',
String[1] $audit_suid_sgid_tag = "${audit_suid_tag}/${audit_sgid_tag}",
Boolean $audit_kernel_modules = true,
String[1] $audit_kernel_modules_tag = 'module-change',
Boolean $audit_mount = true,
String[1] $audit_mount_tag = 'privileged-mount',
Boolean $audit_local_account = true,
String[1] $audit_local_account_tag = 'identity',
Boolean $audit_selinux_cmds = true,
String[1] $audit_selinux_cmds_tag = 'privileged-priv_change',
Boolean $audit_login_files = true,
String[1] $audit_login_files_tag = 'logins',
Boolean $audit_cfg_sudoers = true,
String[1] $audit_cfg_sudoers_tag = 'privileged-actions',
Boolean $audit_passwd_cmds = true,
String[1] $audit_passwd_cmds_tag = 'privileged-passwd',
Boolean $audit_priv_cmds = true,
String[1] $audit_priv_cmds_tag = 'privileged-priv_change',
Boolean $audit_postfix_cmds = true,
String[1] $audit_postfix_cmds_tag = 'privileged-postfix',
Boolean $audit_ssh_keysign_cmd = true,
String[1] $audit_ssh_keysign_cmd_tag = 'privileged-ssh',
Boolean $audit_crontab_cmd = true,
String[1] $audit_crontab_cmd_tag = 'privileged-cron',
Boolean $audit_pam_timestamp_check_cmd = true,
String[1] $audit_pam_timestamp_check_cmd_tag = 'privileged-pam',
) {
assert_private()
$_suid_sgid_cmds = unique($default_suid_sgid_cmds + $suid_sgid_cmds)
$_short_name = 'stig'
$_idx = auditd::get_array_index($_short_name, $auditd::config::profiles)
file { "/etc/audit/rules.d/50_${_idx}_${_short_name}_base.rules":
mode => $auditd::config::config_file_mode,
content => epp("${module_name}/rule_profiles/stig/base.epp")
}
}
|