Information
At Level 1, utilize Trusted Execution (TE) to log execution of applications not yet allowlisted. This can be used to update the allowlist (TSD - /etc/security/tsd/tsd.dat ) so that, at Profile Level 2, non-listed applications are actually prevented from executing.
Trusted Execution (TE) provides an additional layer of access controls to processes on top of the base Discretionary Access Controls. Monitoring how processes access system resources can improve awareness of system integrity.
Solution
NOTE : This does not include the process for configuring the AUDIT system.See:
Setting Up Auditing
->
https://www.ibm.com/docs/en/aix/7.3?topic=overview-setting-up-auditing
# trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=OFF
# mkdir -p /var/log/syslog
# touch /var/log/syslog/kernel.log
# print "kern.info /var/log/syslog/kernel.log rotate 1m files 24 compress" >> /etc/syslog.conf
# print "kern.info @rsyslog.domain" >> /etc/syslog.conf
# refresh -s syslogd || startsrc -s syslogd
Impact:
As long as the TE policies STOP_UNTRUSTED=OFF and STOP_ON_CHKFAIL=OFF the system will only log missing entries.