heroui logo

Linux Auditd Disable Or Modify System Firewall

Splunk Security Content

View Source
Summary
This detection rule analyzes the log data generated by the Linux Audit daemon (`auditd`) to identify any events where the system firewall has been disabled or modified. Such actions are critical indicators of potential unauthorized access attempts or persistent control over the system by an attacker, posing significant risks to the integrity of the network. The detection employs a query that monitors for service stop events pertaining to standard firewall services (like `firewalld` and `ufw`). Alerts generated on finding such activities can inform Security Operations Centers (SOC) of possible malicious activities, enabling rapid response to mitigate potential breaches.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • Application Log
ATT&CK Techniques
  • T1562.004
  • T1562
Created: 2024-11-13