Puppet Class: cis_security_hardening::rules::auditd_rmdir
- Defined in:
- manifests/rules/auditd_rmdir.pp
Summary
Ensure audit of the rmdir syscallOverview
The operating system must audit all uses of the rmdir syscall.
Rationale: If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 |
# File 'manifests/rules/auditd_rmdir.pp', line 19
class cis_security_hardening::rules::auditd_rmdir (
Boolean $enforce = false,
) {
if $enforce {
$uid = fact('cis_security_hardening.auditd.uid_min') ? {
undef => '1000',
default => fact('cis_security_hardening.auditd.uid_min'),
}
concat::fragment { 'watch rmdir rule 1':
order => '210',
target => $cis_security_hardening::rules::auditd_init::rules_file,
content => "-a always,exit -F arch=b32 -S rmdir -F auid>=${uid} -F auid!=4294967295 -k delete",
}
if $facts['os']['architecture'] == 'x86_64' or $facts['os']['architecture'] == 'amd64' {
concat::fragment { 'watch rmdir rule 2':
order => '211',
target => $cis_security_hardening::rules::auditd_init::rules_file,
content => "-a always,exit -F arch=b64 -S rmdir -F auid>=${uid} -F auid!=4294967295 -k delete",
}
}
}
}
|