Puppet Class: cis_security_hardening::rules::auditd_umount

Defined in:
manifests/rules/auditd_umount.pp

Summary

Ensure audit the umount command

Overview

The operating system must audit all uses of the umount command.

Rationale: Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information.

At a minimum, the organization must audit the full-text recording of privileged mount commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise.

Examples:

class { 'cis_security_hardening::rules::auditd_umount':
  enforce => true,
}

Parameters:

  • enforce (Boolean) (defaults to: false)

    Enforce the rule



22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
# File 'manifests/rules/auditd_umount.pp', line 22

class cis_security_hardening::rules::auditd_umount (
  Boolean $enforce = false,
) {
  if $enforce {
    $uid = fact('cis_security_hardening.auditd.uid_min') ? {
      undef => '1000',
      default => fact('cis_security_hardening.auditd.uid_min'),
    }
    concat::fragment { 'watch umount rule 1':
      order   => '207',
      target  => $cis_security_hardening::rules::auditd_init::rules_file,
      content => "-a always,exit -F path=/usr/bin/umount -F auid>=${uid} -F auid!=4294967295 -k privileged-mount",
    }
  }
}