4.1.8 Ensure login and logout events are collected - auditctl faillog

Information

Monitor login and logout events. The parameters below track changes to files associated with login/logout events. The file /var/log/faillog tracks failed events from login. The file /var/log/lastlog maintain records of the last time a user successfully logged in. The file /var/log/tallylog maintains records of failures via the pam_tally2 module

Rationale:

Monitoring login/logout events could provide a system administrator with information associated with brute force attacks against user logins.

Solution

Add the following lines to the /etc/audit/audit.rules file:

-w /var/log/faillog -p wa -k logins
-w /var/log/lastlog -p wa -k logins
-w /var/log/tallylog -p wa -k logins

Impact:

Auditing can produce a large amount of information, creating large and/or many audit log files.

Notes:

Reloading the auditd config to set active settings may require a system reboot.

See Also

https://workbench.cisecurity.org/files/2619

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

References: 800-53|AC-2(12), 800-53|AC-11, 800-53|AU-3, CSCv7|4.9, CSCv7|16.11, CSCv7|16.13

Plugin: Unix

Control ID: 5643f9ed6f52a85d93f28b046951510b9e5767fddad5803edd42d2b38160d76c