Auditd Configuration Best Practices Logo

Auditd Configuration Best Practices

0
Free
Visit Website

The idea of this auditd configuration is to provide a basic configuration that works out-of-the-box on all major Linux distributions, fits most use cases, produces a reasonable amount of log data, covers security-relevant activity, and is easy to read with different sections and many comments. Sources: Gov.uk auditd rules, alphagov/puppet-auditd#1, CentOS 7 hardening, Linux audit repo, Auditd high-performance Linux auditing. Further rules for PCI DSS compliance and NISPOM compliance are available.

FEATURES

ALTERNATIVES

Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.

Incident response and case management solution for efficient incident response and management.

npm security team foils plot to steal $13 million in cryptocurrency

A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.

PacBot is a platform for continuous compliance monitoring, compliance reporting, and security automation for the cloud, with a plugin-based data ingestion architecture.

A System for Abuse- and Incident Handling with log file analysis capabilities.

Detect signed malware and track stolen code-signing certificates using osquery.

A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.