Auditd Configuration Best Practices Logo

Auditd Configuration Best Practices

0
Free
Visit Website

The idea of this auditd configuration is to provide a basic configuration that works out-of-the-box on all major Linux distributions, fits most use cases, produces a reasonable amount of log data, covers security-relevant activity, and is easy to read with different sections and many comments. Sources: Gov.uk auditd rules, alphagov/puppet-auditd#1, CentOS 7 hardening, Linux audit repo, Auditd high-performance Linux auditing. Further rules for PCI DSS compliance and NISPOM compliance are available.

FEATURES

ALTERNATIVES

Open-source, free, and scalable cyber threat intelligence and security incident response solution with improved performance and new features.

CrowdStrike Charlotte AI is a conversational AI assistant that accelerates security operations by automating tasks and providing faster intelligence through generative AI capabilities.

A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.

Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.

A framework for improving detection strategies and alert efficacy.

Automatically configure your app to follow OWASP security patterns and principles with Nuxt Security module.

Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

PINNED