Linux SIEM (Logging/Correlating/Monitoring)
I'm going to start monitoring our Linux servers with a log management/correlation tool to take a proactive approach to the security of our systems. Right now I'm going to search for log events that include the following:
Failed user login “authentication failure”,“failed password”
User account change or deletion “password changed”,“new user”,“delete user”
Sudo actions “sudo:COMMAND=…” “FAILED su”
Service failure “failed” or “failure”
Can anyone else recomend any other commands or logs that would be good to correlate or be alerted on when a potential breach or suspicous activity is happening on the box? Logging cleared, permission changes on accounts or particular files or directories? What would you want to see while monioring your servers? Is anyone doing anything similar?
|