
Hello Felipe,
For compliance with this requirement, you need to verify any access to audit logs as they are often altered by individuals with fraudulent intentions. Keeping a check on audit log access will allow discovering if any changes, addition or deletion has been made by a particular user name.
Wazuh already provides PCI-DSS compliance, so in order to approach this one, you could use syscheck in order to monitor the audit logs and generate the security event that involves that certain compliance.
/var/ossec/etc/ossec.conf file. Find the following section <!-- File types to ignore -->
<ignore type="sregex">.log$|.swp$</ignore>
And avoid to ignore the .log files by editing it like this:
<!-- File types to ignore -->
<ignore type="sregex">.swp$</ignore>
Then, append the following configuration to your syscheck block:
<directories check_all="yes" whodata="yes" report_changes="yes" restrict="audit.log">/var/log/audit/</directories>
I hope that helps, please let me know if you have any question.
Regards,
Manuel
--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To post to this group, send email to wa...@googlegroups.com.
Visit this group at https://groups.google.com/group/wazuh.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/CAEBBC57-61A5-4117-9476-21CDF0BC5AFF%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


<!-- File types to ignore --> <ignore type="sregex">.log$|.swp$</ignore>
<directories check_all="yes" whodata="yes" report_changes="yes" restrict="audit.log">/var/log/audit/</directories>
El 22-01-2019, a las 13:51, Manuel Jiménez <manuel....@wazuh.com> escribió:
Hello Felipe,
For compliance with this requirement, you need to verify any access to audit logs as they are often altered by individuals with fraudulent intentions. Keeping a check on audit log access will allow discovering if any changes, addition or deletion has been made by a particular user name.
Wazuh already provides PCI-DSS compliance, so in order to approach this one, you could usesyscheckin order to monitor the audit logs and generate the security event that involves that certain compliance.
- Edit your
/var/ossec/etc/ossec.conffile. Find the following section<!-- File types to ignore --> <ignore type="sregex">.log$|.swp$</ignore>And avoid to ignore the
.logfiles by editing it like this:<!-- File types to ignore --> <ignore type="sregex">.swp$</ignore>Then, append the following configuration to your
syscheckblock:<directories check_all="yes" whodata="yes" report_changes="yes" restrict="audit.log">/var/log/audit/</directories>I hope that helps, please let me know if you have any question.
Regards,
Manuel
On Tue, Jan 22, 2019 at 12:15 PM Felipe Andres Concha Sepúlveda <felipeandresc...@gmail.com> wrote:
Hello everyone, I have a questionHow can I comply with the PCI DDS 10.2.3 Access to all Audit trails control.the documentation is not clear to me
<PastedGraphic-5.png>
--
You received this message because you are subscribed to the Google Groups "Wazuh mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To post to this group, send email to wa...@googlegroups.com.
Visit this group at https://groups.google.com/group/wazuh.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/CAEBBC57-61A5-4117-9476-21CDF0BC5AFF%40gmail.com.
For more options, visit https://groups.google.com/d/optout.
Hello Felipe,
Sorry for the late reply. Regarding your questions:
What does this restrict="audit.log. ?
According to the documentation about the restrict option :
Limit checks to files containing the entered string in the file name.
Any directory or file name (but not a path) is allowed
That means that in the /var/log/ directory, the audit.log file will be monitored. That’s what the 10.2.3 PCI-DSS rule is about. Maybe you’re not currently receiving any alert because of the ignore statement in the ossec.conf file:
<!-- File types to ignore -->
<ignore type="sregex">**.log$|**.swp$</ignore>
Notice that, by default, syscheck ignores any log file, so you have to avoid it by editing that to this:
<!-- File types to ignore -->
<ignore type="sregex">**.swp$</ignore>
Put that statement into your syscheck block of your group'sagent.conf, it will be pushed to the agents.
Let me know if you still have any question.
Best regards,
Manuel
<!-- File rotation/ reduced rules -->
<rule id="591" level="3">
<if_sid>500</if_sid>
<match>^ossec: File rotated </match>
<description>Log file rotated.</description>
<group>pci_dss_10.5.2,pci_dss_10.5.5,gpg13_10.1,gdpr_II_5.1.f,gdpr_IV_35.7.d,</group>
</rule>
<rule id="592" level="8">
<if_sid>500</if_sid>
<match>^ossec: File size reduced</match>
<description>Log file size reduced.</description>
<group>attacks,pci_dss_10.5.2,pci_dss_11.4,gpg13_10.1,gdpr_IV_35.7.d,</group>
</rule>
<rule id="593" level="9">
<if_sid>500</if_sid>
<match>^ossec: Event log cleared</match>
<description>Microsoft Event log cleared.</description>
<group>logs_cleared,pci_dss_10.5.2,gpg13_10.1,gdpr_II_5.1.f,gdpr_IV_35.7.d,</group>
</rule>
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/CAAz-jY7hcOER0AfK8ubRZ2PqnkG8zAVHV4ywTH3GRc%2BoAHoXJA%40mail.gmail.com.
<image001.png>
c.-When creating a file and then making a modification to the file, alerts are generated
<image002.png>