My Special Security Team, not being UNIX/Linux savvy asked me if I could put into place
audit rules that monitor "Root-Level" commands.
I don't know of any specific identifier for such a term, and the closest thing I could
come up with was monitoring those files that fall under /usr/sbin/ and /sbin/; does anyone
else have any thoughts about how to approach this task?
I figured I would use a rule such as:
-w /sbin/ -p rawx -k watch_root_commands (I used rawx, to account for
replacement by a hacker)
Thank you in advance,
Warron French, MBA, SCSA