4.1.9 Ensure login and logout events are collected - auditctl /var/run/faillock

Information

Monitor login and logout events. The parameters below track changes to files associated with login/logout events. The file /var/log/faillog tracks failed events from login. The file /var/log/lastlog maintain records of the last time a user successfully logged in. The file /var/log/tallylog maintains records of failures via the pam_tally2 module

Rationale:

Monitoring login/logout events could provide a system administrator with information associated with brute force attacks against user logins.

Solution

Edit or create a file in the /etc/audit/rules.d/ directory ending in .rules
Example: vi /etc/audit/rules.d/audit.rules
and add the following lines:

-w /var/log/lastlog -p wa -k logins
-w /var/run/faillock/ -p wa -k logins




Notes:

Reloading the auditd config to set active settings may require a system reboot.

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019



Vul ID: V-72145

Rule ID: SV-86769r4_rule

STIG ID: RHEL-07-030610

Severity: CAT II



Vul ID: V-72147

Rule ID: SV-86771r3_rule

STIG ID: RHEL-07-030620

Severity: CAT II

See Also

https://workbench.cisecurity.org/files/2688

Item Details

Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

References: 800-53|AC-2(12), 800-53|AC-11, 800-53|AU-3, CSCv7|4.9, CSCv7|16.11, CSCv7|16.13

Plugin: Unix

Control ID: 4e47933e1de226b3eef14378eed47e1de87a1b3624739aa5e6c64cedf8dc4e6a