CCE-92105-6Platform: cpe:/o:amazon:linux:2 | Date: (C)2018-10-29 (M)2023-07-04 |
The audit system already collects process information for all
users and root. To watch for attempted manual edits of files involved in
storing such process information, add the following to
'/etc/audit/audit.rules':
-w /var/run/utmp -p wa -k session
-w /var/log/btmp -p wa -k session
-w /var/log/wtmp -p wa -k session
Parameter:
[yes/no]
Technical Mechanism:
Manual editing of these files may indicate nefarious activity, such
as an attacker attempting to remove evidence of an intrusion.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.3 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48805 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:48292 |