Auditd Configuration Best Practices Logo

Auditd Configuration Best Practices

0
Free
Visit Website

The idea of this auditd configuration is to provide a basic configuration that works out-of-the-box on all major Linux distributions, fits most use cases, produces a reasonable amount of log data, covers security-relevant activity, and is easy to read with different sections and many comments. Sources: Gov.uk auditd rules, alphagov/puppet-auditd#1, CentOS 7 hardening, Linux audit repo, Auditd high-performance Linux auditing. Further rules for PCI DSS compliance and NISPOM compliance are available.

FEATURES

ALTERNATIVES

Receive important notifications and updates related to North American electric grid security.

AWS Community repository of custom Config rules with instructions for leveraging and developing AWS Config Rules.

A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.

Open source application to instantly remediate common security issues through the use of AWS Config.

Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

A panic button app for triggering a ripple effect across apps responding to panic events

A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.

An AI-powered security operations platform that automates alert investigation, triage, and response workflows for SOC analysts.

PINNED