3.890 - The system must audit all uses of the renameat syscall - 64 bit

Information

If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.

Satisfies: SRG-OS-000466-GPOS-00210, SRG-OS-000467-GPOS-00210, SRG-OS-000468-GPOS-00212, SRG-OS-000392-GPOS-00172

Solution

Configure the operating system to generate audit records when successful/unsuccessful attempts to use the 'renameat' syscall occur.

Add the following rules in '/etc/audit/rules.d/audit.rules':

Note: The rules are duplicated to cover both 32-bit and 64-bit architectures. Only the lines appropriate for the system architecture must be configured.

-a always,exit -F arch=b32 -S renameat -F auid>=1000 -F auid!=4294967295 -k delete

-a always,exit -F arch=b64 -S renameat -F auid>=1000 -F auid!=4294967295 -k delete

The audit daemon must be restarted for the changes to take effect.

See Also

https://docs.fedoraproject.org/f28/system-administrators-guide/index.html