Puppet Class: cis_security_hardening::rules::auditd_immutable
- Defined in:
- manifests/rules/auditd_immutable.pp
Summary
Ensure the audit configuration is immutableOverview
Set system audit so that audit rules cannot be modified with auditctl . Setting the flag “-e 2” forces audit to be put in immutable mode. Audit changes can only be made on system reboot.
Rationale: In immutable mode, unauthorized users cannot execute changes to the audit system to potentially hide malicious activity and then put the audit rules back. Users would most likely notice a system reboot and that could alert administrators of an attempt to make unauthorized audit changes.
21 22 23 24 25 26 27 28 29 30 31 |
# File 'manifests/rules/auditd_immutable.pp', line 21
class cis_security_hardening::rules::auditd_immutable (
Boolean $enforce = false,
) {
if $enforce {
concat::fragment { 'make config immutable':
order => '999',
target => $cis_security_hardening::rules::auditd_init::rules_file,
content => '-e 2',
}
}
}
|