Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ======4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected (Scored)====== =====Profile Applicability===== <code> Level 2 - Server Level 2 - Workstation </code> =====Description===== Monitor SELinux mandatory access controls. The parameters below monitor any write access (potential additional, deletion or modification of files in the directory) or attribute changes to the /etc/selinux or directory. =====Rationale===== Changes to files in these directories could indicate that an unauthorized user is attempting to modify access controls and change security contexts, leading to a compromise of the system. =====Audit===== Run the following command and verify output matches: <Code:bash> # grep MAC-policy /etc/audit/audit.rules -w /etc/selinux/ -p wa -k MAC-policy </Code> =====Remediation===== Add the following line to the /etc/audit/audit.rules file: <Code:bash> -w /etc/selinux/ -p wa -k MAC-policy </Code> centos7/4/1/7.txt Last modified: 2017/05/04 18:05by Piotr Kłoczewski