03-04-2002
Unix Security and auditing
I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had some audit experience on unix. Thanks.
8 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level)
Thanks
Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies
2. UNIX Desktop Questions & Answers
Sorry, Unix file security
Thanks (1 Reply)
Discussion started by: DuttO
1 Replies
3. HP-UX
Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies
4. Cybersecurity
Hi everyone,
Does anyone use a good unix security alert provider (such as CERT/SANS) that caters specifically to Unix and would provide a similar method of alert reporting? Any suggestions (with links!! :) ) would be helpful and appreciated.
Thanks in advance
:p (4 Replies)
Discussion started by: cbalemba
4 Replies
5. Cybersecurity
this is a pretty good article that is a little dated, but still very informative at freeos.com.
since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box.
some of this... (8 Replies)
Discussion started by: norsk hedensk
8 Replies
6. UNIX for Advanced & Expert Users
I need to log or 'audit' any access to a shared directory which is stored on a NetApp appliance. I need to be able to 'prove' who has acessed the data in this directory at any time. I am just not sure how to do this. The systems that will be accessing this are Linux systems.
Any help is... (2 Replies)
Discussion started by: frankkahle
2 Replies
7. HP-UX
Is there anyway to trace where a user has logged in from.
Someone this morning deleted some data but I only have the following info from the last command
cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02)
cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02)
cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies
8. Solaris
I want to periodically check if ASCII password/config files on Unix have 400 or 600 access. Folders and files are owned by designated group and user. Folders and Files do not have world write access.
Are there any tools/scripts available for this kind of auditing that I can use on Solaris? (7 Replies)
Discussion started by: kchinnam
7 Replies
LEARN ABOUT X11R4
audit_data
audit_data(4) File Formats audit_data(4)
NAME
audit_data - current information on audit daemon
SYNOPSIS
/etc/security/audit_data
DESCRIPTION
The audit_data file contains information about the audit daemon. The file contains the process ID of the audit daemon, and the pathname of
the current audit log file. The format of the file is:
pid>:<pathname>
Where pid is the process ID for the audit daemon, and pathname is the full pathname for the current audit log file.
EXAMPLES
Example 1: A sample audit_data file.
64:/etc/security/audit/server1/19930506081249.19930506230945.bongos
FILES
/etc/security/audit_data
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Obsolete |
+-----------------------------+-----------------------------+
SEE ALSO
audit(1M), auditd(1M), bsmconv(1M), audit(2), audit_control(4), audit.log(4)
NOTES
The functionality described on this manual page is internal to audit(1M) and might not be supported in a future release.
The auditd utility is the only supported mechanism to communicate with auditd(1M). The current audit log can be determined by examining the
configured audit directories. See audit_control(4).
The functionality described on this manual page is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for
more information.
SunOS 5.10 14 Nov 2002 audit_data(4)