2.1.2 Ensure Unauthorized Applications are reported

Information

At Level 1, utilize Trusted Execution (TE) to log execution of applications not yet allowlisted. This can be used to update the allowlist (TSD - /etc/security/tsd/tsd.dat ) so that, at Profile Level 2, non-listed applications are actually prevented from executing.

Trusted Execution (TE) provides an additional layer of access controls to processes on top of the base Discretionary Access Controls. Monitoring how processes access system resources can improve awareness of system integrity.

Solution

NOTE : This does not include the process for configuring the AUDIT system.See:

Setting Up Auditing

->

https://www.ibm.com/docs/en/aix/7.3?topic=overview-setting-up-auditing

# trustchk -p TE=ON CHKEXEC=ON STOP_ON_CHKFAIL=OFF

# mkdir -p /var/log/syslog
# touch /var/log/syslog/kernel.log
# print "kern.info /var/log/syslog/kernel.log rotate 1m files 24 compress" >> /etc/syslog.conf
# print "kern.info @rsyslog.domain" >> /etc/syslog.conf
# refresh -s syslogd || startsrc -s syslogd

Impact:

As long as the TE policies STOP_UNTRUSTED=OFF and STOP_ON_CHKFAIL=OFF the system will only log missing entries.

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(5), 800-53|CM-10, CSCv7|2.7

Plugin: Unix

Control ID: c729470721c13a2cc6be6e35cd4b8c497e83cff64aab77fd97487ecea88f88ee