Profile Applicability:
• Level 2
Description:
Logging login and logout events is essential to monitor user access, track session activity, and detect unauthorized access attempts. Collecting these events provides accountability and supports forensic investigations.
Rationale:
Auditing login/logout events enhances security monitoring by capturing critical user session activities and enabling timely detection of suspicious behavior.
Impact:
Pros:
Provides detailed records of user access for auditing and compliance.
Supports incident response and security investigations.
Cons:
May generate a large volume of logs requiring proper log management.
Default Value:
Audit rules for login/logout events may not be enabled by default.
Pre-requisites:
Root or sudo privileges to configure audit rules.
Remediation:
Test Plan:
Using Linux command line:
Check existing audit rules for login/logout events:
auditctl -l | grep -E 'login|logout|session'
Verify audit rules exist for files such as /var/log/faillog, /var/log/lastlog, /var/log/wtmp, and /var/run/utmp.
Implementation Plan:
Using Linux command line:
Add audit rules to monitor login and logout events:
auditctl -w /var/run/utmp -p wa -k session auditctl -w /var/log/wtmp -p wa -k session auditctl -w /var/log/faillog -p wa -k session auditctl -w /var/log/lastlog -p wa -k session
Persist these rules in /etc/audit/rules.d/audit.rules.
Backout Plan:
Using Linux command line:
Remove or disable login/logout audit rules if necessary:
auditctl -W /var/run/utmp -p wa -k session auditctl -W /var/log/wtmp -p wa -k session auditctl -W /var/log/faillog -p wa -k session auditctl -W /var/log/lastlog -p wa -k session
Reload audit daemon configuration.
References:
CIS Amazon Linux 2 Benchmark v3.0.0