User Accounting   «Prev 

User auditing in Redhat Linux

Linux Audit system

The Linux Audit system provides a way to track security-relevant information on your system. Based on pre-configured rules, Audit generates log entries to record as much information about the events that are happening on your system as possible. This information is crucial for mission-critical environments to determine the violator of the security policy and the actions they performed. Audit does not provide additional security to your system; rather, it can be used to discover violations of security policies used on your system. These violations can further be prevented by additional security measures such as SELinux.
The following list summarizes some of the information that Audit is capable of recording in its log files:
  1. Date and time, type, and outcome of an event.
  2. Sensitivity labels of subjects and objects.
  3. Association of an event with the identity of the user who triggered the event.
  4. All modifications to Audit configuration and attempts to access Audit log files.
  5. All uses of authentication mechanisms, such as SSH, Kerberos, and others.
  6. Changes to any trusted database, such as /etc/passwd.
  7. Attempts to import or export information into or from the system.
  8. Include or exclude events based on user identity, subject and object labels, and other attributes.

The use of the Audit system is also a requirement for a number of security-related certifications. Audit is designed to meet or exceed the requirements of the following certifications or compliance guides:
  1. Controlled Access Protection Profile (CAPP)
  2. Labeled Security Protection Profile (LSPP)
  3. Rule Set Base Access Control (RSBAC)
  4. National Industrial Security Program Operating Manual (NISPOM)
  5. Federal Information Security Management Act (FISMA)
  6. Payment Card Industry: Data Security Standard (PCI-DSS)
  7. Security Technical Implementation Guides (STIG)
Audit has also been:
Evaluated by National Information Assurance Partnership (NIAP) and Best Security Industries (BSI).
Certified to LSPP/CAPP/RSBAC/EAL4+ on Red Hat Enterprise Linux 5.
Certified to Operating System Protection Profile / Evaluation Assurance Level 4+ (OSPP/EAL4+) on Red Hat Enterprise Linux 6.

This summarizes accounting information on a per-user basis.

This lists how different users have stayed connected to the system since the logs were last rotated.

This lists login sessions in the most recent first order.