2.5 Ensure Unauthorized Applications are reported

Information

At Level 1, utilize Trusted Execution (TE) to log execution of applications not yet allowlisted. This can be used to update the allowlist (TSD - /etc/security/tsd/tsd.dat ) so that, at Profile Level 2, non-listed applications are actually prevented from executing.

Trusted Execution (TE) provides an additional layer of access controls to processes on top of the base Discretionary Access Controls. Monitoring how processes access system resources can improve awareness of system integrity.

Solution

Run the following commands:

# trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=OFF

# mkdir -p /var/log/syslog
# touch /var/log/syslog/kernel.log
# print "kern.info /var/log/syslog/kernel.log rotate 1m files 24 compress" >> /etc/syslog.conf
# refresh -s syslogd || startsrc -s syslogd

Impact:

As long as the TE policies STOP_UNTRUSTED and STOP_ON_CHKFAIL are OFF the TE security subsystem will only log allowlist omissions.

See Also

https://workbench.cisecurity.org/benchmarks/19066

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(5), 800-53|CM-10, CSCv7|2.7

Plugin: Unix

Control ID: 5ad4a067b84629e3fee7288d8b6081630ba7875a829e95b0d018377b9b0ce9d7