Information
At Level 1, utilize Trusted Execution (TE) to log execution of applications not yet allowlisted. This can be used to update the allowlist (TSD - /etc/security/tsd/tsd.dat ) so that, at Profile Level 2, non-listed applications are actually prevented from executing.
Trusted Execution (TE) provides an additional layer of access controls to processes on top of the base Discretionary Access Controls. Monitoring how processes access system resources can improve awareness of system integrity.
Solution
Run the following commands:
# trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=OFF
# mkdir -p /var/log/syslog
# touch /var/log/syslog/kernel.log
# print "kern.info /var/log/syslog/kernel.log rotate 1m files 24 compress" >> /etc/syslog.conf
# refresh -s syslogd || startsrc -s syslogd
Impact:
As long as the TE policies STOP_UNTRUSTED and STOP_ON_CHKFAIL are OFF the TE security subsystem will only log allowlist omissions.