
Summary
The rule 'Potential Disabling of SELinux' is designed to detect attempts to turn off Security-Enhanced Linux (SELinux), a critical security feature in the Linux kernel that enforces access control policies. Adversaries often seek to disable SELinux to thwart detection mechanisms for their activities, which can lead to unauthorized access or system manipulation. This rule employs the EQL (Event Query Language) to monitor process executions specifically targeting the command 'setenforce 0', which switches SELinux to permissive mode, effectively decreasing its security posture. The detection query checks for Linux process events related to this command, primarily when the process name equals 'setenforce' and the argument is '0'. Successful detection allows security teams to investigate potential defense evasion tactics employed by attackers, strengthening the overall security posture of Linux environments. In addition to the potential alert generation, the rule provides a comprehensive investigation guide that outlines potential triage steps, false positive analyses, and recommended remediation actions. The integration prerequisites for this rule involve data from systems using Elastic Defend or Auditbeat, which can be configured to monitor the necessary events.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- Logon Session
- User Account
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-04-22