Home  >  Article  >  Operation and Maintenance  >  How to set up system security auditing on Linux

How to set up system security auditing on Linux

王林
王林Original
2023-07-07 16:47:173351browse

How to set up system security auditing on Linux

In today's digital era, network security has become a major challenge we face. To protect our systems and data from unauthorized access and malicious attacks, we need to implement a series of security measures. One of them is to turn on system security auditing. This article will introduce you to how to set up system security auditing on Linux, with relevant code examples.

First of all, we need to understand what system security audit is. System security auditing is a method of monitoring and recording system activity in order to detect and analyze potential security risks and threats. It can record login and logout events, file and directory access, process activities and other system activity information. By analyzing this information, we can detect abnormal behaviors in time and take appropriate measures.

In Linux systems, we can use the Auditing subsystem (auditd) to implement system security auditing. First, make sure your system has the auditd package installed. If it is not installed, you can use the following command to install it:

sudo apt-get install auditd

After the installation is complete, we need to configure auditd to start recording system activities. Open the /etc/audit/auditd.conf file and make sure the following settings are enabled:

# 启用系统启动记录
#
# 当auditd服务启动时,会记录一条启动记录
#
# 可以通过`ausearch -m SYSTEM_BOOT`命令检查这条记录
#
# 默认值为no
#
# 将其设置为yes开启记录

AUDITD_ENABLED=yes

Next, we need to configure the audit rules to specify the types of system activity we wish to log. For example, the following rules will log login and logout events, file and directory access:

# 监控登录和注销事件
-a always,exit -F arch=b64 -S execve -k login_logout

# 监控文件和目录访问
-w /etc/passwd -p wa -k file_access
-w /etc/shadow -p wa -k file_access
-w /etc/group -p wa -k file_access

Add the above rules to the /etc/audit/rules.d/audit.rules file i.e. Can take effect. After saving the file, use the following command to reload the audit rules:

sudo auditctl -R /etc/audit/rules.d/audit.rules

In addition, we can also add, modify and delete runtime audit rules in real time through the auditctl command. For example, the following command will monitor a user's login and logout events:

sudo auditctl -a always,exit -F arch=b64 -S execve -k login_logout

To view logged system activity, we can use the ausearch command. For example, the following command will find records of all login and logout events:

ausearch -m SYSTEM_LOGIN,SYSTEM_LOGOUT

Finally, in order to facilitate the analysis and reporting of system activities, we can use the audit log parsing script provided by the auditd tool. These scripts can convert audit logs into a human-readable format and provide various filtering and statistical functions. For example, the following command will display the login and logout events in the last hour:

sudo aureport --start recent-hour -x --event login_logout

Through the above steps, we can set up system security auditing on the Linux system and improve the security of the system by monitoring and recording system activities sex. However, it is worth noting that system security audit is only one of the security measures, and other security measures need to be used comprehensively to establish a complete security protection system.

In summary, system security auditing is critical to protecting our systems and data from unauthorized access and malicious attacks. This article provides steps and code examples for setting up system security auditing on Linux. We hope it will be helpful to you.

Reference code:

/etc/audit/auditd.conf

AUDITD_ENABLED=yes

/etc/audit/rules.d/audit.rules

# 监控登录和注销事件
-a always,exit -F arch=b64 -S execve -k login_logout

# 监控文件和目录访问
-w /etc/passwd -p wa -k file_access
-w /etc/shadow -p wa -k file_access
-w /etc/group -p wa -k file_access

sudo auditctl -a always,exit -F arch=b64 -S execve -k login_logout

ausearch -m SYSTEM_LOGIN,SYSTEM_LOGOUT

sudo aureport --start recent-hour -x --event login_logout

The above is the detailed content of How to set up system security auditing on Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn