[Forgot Password]
Login  Register Subscribe

24437

 
 

132035

 
 

119400

 
 

909

 
 

96836

 
 

145

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92083-5

Platform: Amazon LinuxDate: (C)2018-10-29   (M)2018-11-30



Record attempts to alter time through adjtimex If the 'auditd' daemon is configured to use the 'augenrules' program to read audit rules during daemon startup (the default), add the following line to a file with suffix '.rules' in the directory '/etc/audit/rules.d': '-a always,exit -F arch=b32 -S adjtimex -k audit_time_rules' If the system is 64 bit then also add the following line: '-a always,exit -F arch=b64 -S adjtimex -k audit_time_rules' If the 'auditd' daemon is configured to use the 'auditctl' utility to read audit rules during daemon startup, add the following line to '/etc/audit/audit.rules' file: '-a always,exit -F arch=b32 -S adjtimex -k audit_time_rules' If the system is 64 bit then also add the following line: '-a always,exit -F arch=b64 -S adjtimex -k audit_time_rules' The -k option allows for the specification of a key in string form that can be used for better reporting capability through ausearch and aureport. Multiple system calls can be defined on the same line to save space if desired, but is not required. See an example of multiple combined syscalls: '-a always,exit -F arch=b64 -S adjtimex -S settimeofday -S clock_settime -k audit_time_rules'


Parameter:


Technical Mechanism: Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. Fix: No Remediation Info

References:

Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:48270


OVAL    2
oval:org.secpod.oval:def:48270
oval:org.secpod.oval:def:48900
XCCDF    4
xccdf_org.secpod_benchmark_general_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_SecPod_Amazon_Linux_AMI
xccdf_org.secpod_benchmark_SecPod_Amazon_Linux_2
xccdf_org.secpod_benchmark_general_Amazon_Linux_2
...

© SecPod Technologies