EPIC: Define & Implement Access Auditing Policy & Tools
As part of Secure Dev, we need to define an access auditing policy, and implement tools/processes to provide this service.
This issue is set up to track work relating to this piece..
Tasks
------------------
-
Investigate monitoring strategies & applicable tools : #2968 - Done
-
Detail Next Steps For Preferred Tool : #3076 - Done
-
Deploy Wazuh To All Build Hosts : Done: 08/11/2023 : https://github.com/adoptium/infrastructure/issues/3235
-
Create Wazuh Code & Configuration Snippets Area in Infrastructure Repository.: https://github.com/adoptium/infrastructure/pull/3262- Complete
-
Create mechanism for tracing ssh logins: Issue 3212 : - Complete
-
Update Wazuh to current version, and define upgrade process and policy for both Wazuh server and agents. - 10/07/2024 - Completed: https://github.com/adoptium/infrastructure/issues/3654
-
Create DNS Name For Wazuh Server - EF issue raised : https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/5076 ( 04/10/2024 ) - Completed - 07/10/2024
-
Add certificates & configure https - https://github.com/adoptium/infrastructure/issues/3768
-
Define critical alerts & create filters.
-
Create & Configure Slack Integration For Critical Alerts
-
Deploy Wazuh To All Test Hosts
-
Investigate how to build Wazuh agent from source on RHEL8 / s390x
-
Investigate how to build Wazuh agent from source on RISCV build machines
-
Investigate Auditing SSH/SSHD versions using Wazuh
For monitoring valid logins on the UNIX platforms we should be able to look at the SSH key fingerprints as per #3212