2.3 Allowlist Authorized Software and Report Violations

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

At Level 1, utilize Trusted Execution (TE) to log execution of applications not yet whitelisted. This can be used to update the whitelist (TSD - /etc/security/tsd/tsd.dat) so that, at Profile Level 2, non-listed applications are actually prevented from executing.

Rationale:

Impact:

As long as the TE policies STOP_UNTRUSTED=OFF and STOP_ON_CHKFAIL=OFF the system will only log missing entries.

Solution

# trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=OFF

# mkdir -p /var/log/syslog
# touch /var/log/syslog/kernel.log
# print 'kern.info /var/log/syslog/kernel.log rotate 1m files 24 compress' >> /etc/syslog.conf
# print 'kern.info @rsyslog.domain' >> /etc/syslog.conf
# refresh -s syslogd || startsrc -s syslogd

Default Value:

TE=OFF

See Also

https://workbench.cisecurity.org/benchmarks/7851