Audit logging
-
operates according to defined audit rules automatically creating audit logs whenever specified actions or changes occur on the router
-
integrates with the Linux Audit Daemon to monitor and log relevant security events across the router, and
-
allows forwarding of audit logs to a remote syslog server.
-
tracks and logs system calls, file accesses, user actions, and other events as specified by audit rules, and
-
provides administrators with insights to detect suspicious behavior and maintain system integrity.
An audit rule is a configuration that
-
specifies which files, directories, or system events should be monitored
-
determines the conditions for monitoring, and
-
forms the foundation of an audit logging system.
An Audit log is a chronological record that
-
is automatically generated when a monitored event, as defined by an audit rule, occurs, and
-
typically includes details such as the event type, timestamp, user or process involved, and affected resources.
Audit rules and audit logs for security monitoring
Administrators define audit rules to track changes to sensitive files, monitor system calls, and observe other critical activities. By customizing audit rules, organizations can align monitoring with their unique security and compliance requirements.
Audit rules establish what to watch, while audit logs capture and document every relevant occurrence, ensuring a complete and actionable history of system activity.
For example, an audit rule that monitors changes to /etc/passwd file creates an audit log entry each time this file is modified.
Audit logging is not to be confused with system logging. While audit logging records security-relevant events, such as user actions and changes to sensitive files, system logging (syslog) captures general system events like service status updates, routine errors, or informational messages.