1. Home
  2. Security Hardening
  3. CIS Red Hat Enterprise Linux 7 STIG V2.0.0 L2 Server
  4. Ensure events that modify the system’s Mandatory Access Controls are collected – auditctl /usr/share/selinux/

Ensure events that modify the system’s Mandatory Access Controls are collected – auditctl /usr/share/selinux/

Details

Monitor SELinux mandatory access controls. The parameters below monitor any write access (potential additional, deletion or modification of files in the directory) or attribute changes to the /etc/selinux/ and /usr/share/selinux/ directories.

Note:

If a different Mandatory Access Control method is used, changes to the corresponding directories should be audited.

Reloading the auditd config to set active settings requires the auditd service to be restarted, and may require a system reboot.

Rationale:

Changes to files in the /etc/selinux/ and /usr/share/selinux/ directories could indicate that an unauthorized user is attempting to modify access controls and change security contexts, leading to a compromise of the system.

Solution

Edit or create a file in the /etc/audit/rules.d/ directory ending in .rules
Example: vi /etc/audit/rules.d/50-MAC_policy.rules
Add the following lines:

-w /etc/selinux/ -p wa -k MAC-policy
-w /usr/share/selinux/ -p wa -k MAC-policy

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles