Cellcrypt-logo

Cellcrypt Federal Stack Auditing and Monitoring

Cellcrypt-Federal-Stack-Auditing-and-monitoring-product

Legal
Copyright © Cellcrypt Inc. All rights reserved. Neither the whole nor any part of the information contained in this document may be adapted or reproduced in any material or electronic form without the prior written consent of the copyright holder. Information in this document is subject to change without notice. Cellcrypt Inc. makes no warranty of any kind with regard to this information, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Cellcrypt Inc. and the authors shall not be liable for errors contained herein or for incidental or consequential damages concerned with the furnishing, performance, or use of this material.

Warning: This document is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this document, or any portion of it, may result in severe civil and criminal penalties and will be prosecuted to the maximum extent possible under law.

Patents pending Cellcrypt Inc
Every effort has been made to ensure that the contents of this document are correct. However, neither the authors nor Cellcrypt Inc. accept any liability for loss or damage caused or alleged to be caused directly or indirectly by this document.

Introduction

This manual will provide instructions on how to audit each component of the Cellcrypt Stack. As this is a technical manual, it is worth mentioning that more information about how auditing works is available in the Auxiliary Services – Audit section of the Technical Specifications and Requirements manual.
If you have any questions or concerns, please contact us at support@csghq.com.

Paths to Logs
Detailed location of the log files for every instance of the Cellcrypt Stack.

DB

Network Device NDcPP Ref Event Where to find it Evidence
FMT_SMF.1 Database query

MariaDB

  • Database Errors and Warnings:/var/log/mariadb/mariadb.log

API

Network Device NDcPP Ref Event Where to find it Evidence
FCS_HTTP S_EXT.1 Failure to establish an HTTPS Session. /var/log/ nginx/api- [DOMAIN]-

error.log

FCS_TLSC_ EXT.1 Failure to establish a TLS Session /var/log/ nginx/api- [DOMAIN]-

error.log

FCS_TLSS_ EXT.1 Failure to establish a TLS Session /var/log/ nginx/api- [DOMAIN]-

error.log

EMP

Network Device NDcPP Ref Event Where to find it Evidence
FIA_AFL.1 Unsuccessful login attempts limit is met or exceeded.
FAU_GEN. 1.1 Resetting passwords /var/log/ messages
/opt/secure/ portal/app/ storage/logs/ laravel.log
FCS_HTTP S_EXT.1 Failure to establish a HTTPS Session. /var/log/ nginx/emp- [DOMAIN]-

error.log

FCS_TLSC_ EXT.1 Failure to establish a TLS Session /var/log/ nginx/emp- [DOMAIN]-

error.log

FCS_TLSS_ EXT.1 Failure to establish a TLS Session /var/log/ nginx/emp- [DOMAIN]-

error.log

MY

Network Device NDcPP

Ref

Event Where to find it Evidence
FCS_HTTP S_EXT.1 Failure to establish a HTTPS Session. /var/log/nginx/my- [DOMAIN]-

error.log

FCS_TLSC

_EXT.1

Failure to establish a TLS Session /var/log/nginx/my- [DOMAIN]-

error.log

FCS_TLSS

_EXT.1

Failure to establish a TLS Session /var/log/nginx/my- [DOMAIN]-

error.log

SAS

Network Device NDcPP Ref Event Where to find it Evidence
FIA_UIA_E XT.1 All use of identification and authentication mechanism. /var/log/ messages
FIA_UAU_E XT.2 All use of identification and authentication mechanism. /var/log/ messages
FMT_SMF.1 All management activities of TSF data. /var/log/ messages
FCS_TLSC_ EXT.1 Failure to establish a TLS Session /var/log/ stunnel/ stunnel.log
FCS_TLSS_ EXT.1 Failure to establish a TLS Session /var/log/ stunnel/ stunnel.log
FCS_TLSS_ EXT.2 Failure to authenticate the client /var/log/ stunnel/ stunnel.log
activate_remote_wipe – /var/log/ messages
authenticate_admin_user /var/log/ messages
admin_logout /var/log/ messages
admin_session_expired /var/log/ messages
send_password_reset_mail /var/log/ messages
check_password_reset /var/log/ messages
reset_password /var/log/ messages
add_admin_user_partner_g roup /var/log/ messages
create_admin_user /var/log/ messages
delete_admin_user /var/log/ messages
user_register /var/log/ messages
modify_user_roles /var/log/ messages
update_by_id /var/log/ messages
device_update_status /var/log/ messages
add_alias /var/log/ messages
remove_alias /var/log/ messages
remove_account /var/log/ messages
auth_my_user /var/log/ messages
user_logout /var/log/ messages

Vault

Network Device NDcPP Ref Event Where to find it Evidence
FCS_HTTP S_EXT.1 Failure to establish a HTTPS Session. /var/log/nginx/ vault- [DOMAIN]-

error.log

FCS_TLSC_ EXT.1 Failure to establish a TLS Session /var/log/nginx/ vault- [DOMAIN]-

error.log

FCS_TLSS_ EXT.1 Failure to establish a TLS Session /var/log/nginx/ vault- [DOMAIN]-

error.log

SIP

Network Device NDcPP

Ref

Event Where to find it Evidence
FAU_GEN

.1/CDR

Audit Data Generation (Call Detail Record) /var/log/ opensips.log 2022-12-07T19:17:55.672734+00:00 sip-* /usr/

local/sbin/opensips[35710]: ACC: call ended: created=1645211866;call_start_time=16452118 67;duration=8;ms_duration=8296;setuptime=1; method=INVITE;from_tag=fa6f84b3-38a2-4709- 8ffd-3e10f52df51d;to_tag=809ab268-06ba-41e 1-9f03-4270ebe692af;call_id=ba07fafd-963c-46 39-

a454-6bba4627c887;code=200;reason=OK;src_i p=;dst_ip=13.90.174.9;call_end_time=1645211 875;call_type=Audio;caller=;callee=

FIA_UAU. 2/VVoIP Successful or failed registration of VVoIP endpoint/device /var/log/ opensips.log
FIA_UAU. 2/VVoIP Authentication of external VvoIP endpoint/device /var/log/ opensips.log
FMT_SMF

.1

Enabling/disabling VVoIP endpoint/device features /var/log/ opensips.log
FCS_TLS S_EXT.2 Failure to authenticate the client /var/log/ opensips.log

Nginx

  • TLS Access – Registers every TLS connection to the HTTPS Proxy/var/log/nginx/api.domain.com-access.log
  • TLS Error – Registers every TLS error when connecting to the HTTPS Proxy/var/log/nginx/api.domain.com-error.log

 Stunnel
Stunnel service logs /var/log/stunnel/stunnel.log

ECS
ECS Supervisor

ECS actions and errors
/var/log/supervisor/ecs-stderr

ECS Connectivity errors
/var/log/supervisor/ecs-stdout-

Sync actions and errors
/var/log/supervisor/sync-emp-stderr

Sync Connectivity error
/var/log/supervisor/sync-emp-stdout-

Supervisor
Log – Registers whenever the server is spawned, stopped, or rebooted. /var/log/supervisor/supervidord.log

Asterisk
Asterisk logs, actions, and error messages

Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy/var/log/nginx/ecs.domain.com-access.log

TLS Error – Registers every TLS error when connecting to the HTTPS Proxy/var/log/nginx/ecs.domain.com-error.log

SAS
SAS Supervisor
SAS NodeJS Workers’ logs, actions, and error messages
/var/log/supervisor/*

Backend-v4 transactions, messages, and logs
/var/log/supervisor/backend-v4-*

Supervisor Log
Registers whenever the server is spawned, stopped, or rebooted. /var/log/supervisor/supervidord.log

Secure Application Server
SAS Gearman Workers’ logs, actions, and error messages
/var/log/secure-application-server/*

German
German server runtime errors
/var/log/gearman-job-server/gearman.log

Redis
Redis operations logs
/var/log/redis/redis-server.log

Revinetd
Revinetd transactions and connections logs
/var/log/supervisor/sip-reverse-stderr-*

Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log

SIP
SIP Supervisor
Revinetd – SIP Reverse service logs
/var/log/supervisor/sip-reverse-stderr-*Supervisor Log – Registers whenever server is spawned, stopped or rebooted. /var/log/supervisor/supervidord.log

Opensips
Registers every SIP connection attempt
/var/log/opensips.log

Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log

Vault
Vault Supervisor
Vault service file download/upload notices and error logs
/var/log/supervisor/vault-v3-stderr-*

Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy /var/log/nginx/vault.domain.com-access.log

TLS Error – Registers every TLS error when connecting to the HTTPS Proxy /var/log/nginx/vault.domain.com-error.log

Portal (EMP/My)
Laravel
Registers Portal events, actions, and errors
/opt/secure/portal/app/storage/logs/laravel.log

Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy (EMP)
/var/log/nginx/emp.domain.com-access.log

TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy (EMP)
/var/log/nginx/emp.domain.com-error.log

TLS Access – Registers every
TLS connection to the HTTPS Proxy (MY)
/var/log/nginx/my.domain.com-access.log

TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy (MY)
/var/log/nginx/my.domain.com-error.log

Stunnel
Stunnel service logs
/var/log/stunnel/stunnel.log

AUX

Nginx
TLS Access – Registers every TLS connection to the HTTPS Proxy
/var/log/nginx/aux.domain.com-access.log

TLS Error – Registers every
TLS error when connecting to the HTTPS Proxy
/var/log/nginx/aux.domain.com-error.log

Shared logs
Syslog
All log messages are sent to syslog.
/var/log/messages

NTP
Every NTP-related statistic and log.
/var/log/ntpstats/*

SSH
SSH daemon logs.
/var/log/secure

Stack Auditing

Many of the auditing features of the application were designed in order to comply with NIAP Requirements and are enabled by default.
This informative section provides insights into what requirements are fulfilled and where you can find those pieces of information.

Aux

Network Device NDcPP Ref Event Where to find it Evidence
FCS_HTTP S_EXT.1 Failure to establish a HTTPS Session. /var/log/nginx/ aux-[DOMAIN]-

error.log

NIAP Compliant Auditing Features

Some of the auditing features required by NIAP are available once the audit module is installed. This section explains in further detail each of the available features provided.

 Start-up/shutdown date/time of audit functions
FAU_GEN.1.1 mandates that the TOE shall generate an audit record of the start-up and shutdown of the audit functions

  • Jul 23 14:49:34 ip-172-31-33-210.us-west-2.compute.internal auditd[2207]: The audit daemon is exiting.
  • Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal systemd[1]: Starting Security Auditing Service…
  • Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal auditd[22693]: Started dispatcher: /sbin/ audited paid: 22695
  • Jul 23 14:49:36 ip-172-31-33-210.us-west-2.compute.internal auditd[22693]: Init complete, auditd 2.8.4 listening for events (startup state enabled)

IP connections
FAU_GEN.1.1/Log states that the TSF shall be able to generate a system log record of IP connections.
Nftables outputs any IP connections directly into the syslog file.

Example output for IP Connections

  • Aug 5 19:07:41 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
  • MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
  • PREC=0x00 TTL=38 ID=6627 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=200
  • Aug 5 19:07:42 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
  • MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
  • PREC=0x00 TTL=38 ID=6791 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=201
  • Aug 5 19:07:43 ip-172-31-33-210 kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT=
  • MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00
  • PREC=0x00 TTL=38 ID=6835 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=202
  • Note: Per FAU_GEN.1/CDR’s test no. 1, the IP connections are tested through the “ping” command (hence the log format shown above)

Miscellaneous status logs
FAU_GEN.1.1/Log also calls for disk and file storage capacity, NTP status, CPU usage, memory usage, audit storage capacity, and fan status. The evaluation tests revolve around monitoring said parameters for a 10-minute period and performing calls/messaging. These are handled using a simple shell script to forward the outputs from existing OS monitoring services. The OS utility top is used for CPU/memory status, and df, for available disk space. These outputs are redirected to the syslog log file.

Disk/file storage capacity

  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: Filesystem Size Used Avail Use% Mounted on
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: /dev/xvda2 10G 3.4G 6.7G 34% /
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: devtmpfs 897M 0 897M 0% /dev
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 0 919M 0% /dev/shm
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 79M 840M 9% /run
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 919M 0 919M 0% /sys/fs/cgroup
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 184M 0 184M 0% /run/user/1000
  • Aug 5 18:55:01 ip-172-31-33-210 journal: df -h: tmpfs 184M 0 184M 0% /run/user/0
  • Aug 5 18:55:01 ip-172-31-33-210 ntpstat: synchronised to NTP server (204.11.201.10) at stratum 3
  • Aug 5 18:55:01 ip-172-31-33-210 ntpstat: time correct to within 37 ms
  • Aug 5 18:55:01 ip-172-31-33-210 ntpstat: polling server every 1024 s

CPU/Memory usage

  • Aug 6 14:41:54 ip-172-31-33-210 top: top – 14:41:54 up 19 days, 3:04, 2 users, load average: 0.00, 0.01, 0.05
  • Aug 6 14:41:54 ip-172-31-33-210 top: Tasks: 182 total, 2 running, 180 sleeping, 0 stopped, 0 zombie
  • Aug 6 14:41:54 ip-172-31-33-210 top: %Cpu(s): 0.0 us, 6.2 sy, 0.0 ni, 93.8 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
  • Aug 6 14:41:54 ip-172-31-33-210 top: KiB Mem : 1880524 total, 64660 free, 1247988 used, 567876 buff/cache
  • Aug 6 14:41:54 ip-172-31-33-210 top: KiB Swap: 0 total, 0 free, 0 used. 352988 avail Mem
  • Aug 6 14:41:54 ip-172-31-33-210 top: mbie
  • Aug 6 14:41:54 ip-172-31-33-210 top: PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
  • Aug 6 14:41:54 ip-172-31-33-210 top: 21324 ec2-user 20 0 162028 2104 1540 R 6.2 0.1 0:00.01 top
  • Aug 6 14:41:54 ip-172-31-33-210 top: 1 root 20 0 128148 5032 2504 S 0.0 0.3 4:03.70 systemd
  • Aug 6 14:41:54 ip-172-31-33-210 top: 2 root 20 0 0 0 0 S 0.0 0.0 0:00.36 kthreadd

 Local Administrative Logins
The first item of FAU_GEN.1.1 states that all administrative login and logout events must be accounted for, as well as the start/stop of trusted channels. The stack handles this by setting watching rules on login/logout binaries, which, in addition to “report -l” functionality produces reports on all login attempts on the server. The last package is used for trusted channels initiation/termination info. Additionally, Syslog is configured to audit all attempts to initiate a super-user session (including commands such as sudo).
Login info:

Login Report
date time auid host term exe success event

  1. 08/06/2019 15:50:09 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 919456
  2. 08/06/2019 18:13:41 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 919808
  3. 08/07/2019 09:17:17 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921179
  4. 08/07/2019 13:24:55 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921613
  5. 08/07/2019 13:27:52 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 921820
  6. 08/07/2019 14:46:53 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 924724
  7. 08/07/2019 16:05:17 ec2-user 200.175.61.81.static.gvt.net.br /dev/pts/0 /usr/sbin/sshd yes 926211

Trusted channel info

  • ec2-user pts/0 179.184.19.129.s Mon Aug 5 18:16 – 19:58 (01:41)
  • ec2-user ssh 200.175.61.81.st Mon Aug 5 20:27 – 20:27 (00:00)
  • ec2-user pts/2 200.175.61.81.st Mon Aug 5 19:24 – 22:42 (03:17)
  • ec2-user pts/5 200.175.61.81.st Mon Aug 5 19:52 – 23:59 (04:06)
  • ec2-user pts/2 200.175.61.81.st Tue Aug 6 14:28 – 14:38 (00:09)
  • ec2-user pts/0 179.184.19.129.s Tue Aug 6 14:20 – 14:43 (00:23)
  • ec2-user pts/2 200.175.61.81.st Tue Aug 6 14:38 still logged in

Super-user sessions

  • Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_unix(sudo:session): session opened for user root by ec2- user(uid=0)
  • Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_tty_audit(sudo:session): unknown option `ec2-user’
  • Aug 8 20:40:20 ip-172-31-33-210 sudo: pam_tty_audit(sudo:session): changed status from 1 to 1
  • Aug 8 20:41:39 ip-172-31-33-210 sudo: pam_unix(sudo:session): session closed for user root
  • Aug 8 20:41:54 ip-172-31-33-210 sudo: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/ bin/systemctl restart rsyslog

Bad SH Authentication

  • FAU_GEN.1.1 also requires the TOE to log unsuccessful login attempts, including when they exceed some preset limit.
  • The TOE uses auditd’s own summary reporting plugin – report – and specifies auditing rules for the pam_tty service.
  • Example output: report -i -au –failed
  • Authentication Report date time acct host term exe success event
  • 07/31/2019 12:29:42 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845672
  • 07/31/2019 13:12:40 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845839
  • 07/31/2019 13:31:19 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 845872
  • 07/31/2019 19:01:13 ec2-user 200.175.61.81 ssh /usr/sbin/sshd no 848199
  • 07/31/2019 19:28:00 ec2-user 179.184.19.129 ssh /usr/sbin/sshd no 848260

Changes to Time and Date
The FPT_STM_EXT.1 requirement makes it necessary to audit any discontinuous changes in time. Monitoring time-related binaries and executables (see example below) audit any attempts to discontinuous time changes on the stack.

Example output
Summary report of executables involved in changing the TOE server’s timezone

Executable Report

  • # date time exe term host auid event
  • 332. 08/06/2019 13:23:34 /usr/lib/systemd/systemd ? ? unset 877714
  • 333. 08/06/2019 13:23:34 /usr/lib/systemd/systemd-timedated (none) ? unset 877713
  • 334. 08/06/2019 13:23:34 /usr/lib/systemd/systemd-timedated (none) ? unset 877715
  • 335. 08/06/2019 13:24:04 /usr/lib/systemd/systemd ? ? unset 877716
  • 336. 08/06/2019 13:25:45 /usr/lib/systemd/systemd ? ? unset 877729
  • 337. 08/06/2019 13:25:45 /usr/bin/timedatectl pts0? administrator 877726
  • 338. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877728
  • 339. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877731
  • 340. 08/06/2019 13:25:45 /usr/lib/systemd/systemd-timedated (none) ? unset 877732

Manual Update Attempts

  • FMT_MOF.1/ManualUpdate mandates that all attempts to initiate a manual code update must be audited. Even though FPT_TUD_EXT.
  • events are no longer need to be audited (initiation/result of update attempts), logging the outputs of the manual updates fulfills both requirements.
  • Direct modifications to the setup script were made to log all update messages prompted. E.g.:
  • Aug 6 18:31:54 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
  • Aug 6 18:32:50 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.
  • Aug 6 18:32:50 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Configuring system.
  • Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Starting services.
  • Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Running final checks.
  • Aug 6 18:32:53 ip-172-31-33-210 journal: SW upgrade: #033[1;32mmariadb#033[0m: Installed.

Call Detail Records
The protected local logs include the Call Detail Records (CDRs). These permissions are automatically set during the

  • TOE software installation process. The CDR’s are generated by the ESC OpenSIPS service and consist of the following information:
  • TOE unique identifier
  • Call originator identifier
  • Call receiver identifier
  • Unique transaction sequence number
  • Call status (missed/connected/terminated / failures)
  • Call type (voice/voice + video)
  • Call start time
  • Call end time
  • Call duration
  • Call direction (incoming/outgoing)
  • Call routing into TOE
  • Call routing out of TOE

Time zone
Example call log showing CDR details: 2022-02-18T19:17:55.672734+00:00 sip-alpha /usr/local/bin/opensips[35710]: ACC: call ended:created=1645211866;call_start_time=1645211867;duration=8;ms_duration=8296;setuptime=1;method=INVIT E;from_tag=fa6f84b3-38a2-4709-8ffd-3e10f52df51d;to_tag=809ab268-06ba-41e1-9f03-4270ebe692af;call_id= ba07fafd-963c-4639- a454-6bba4627c887;code=200;reason=OK;src_ip=;dst_ip=13.90.174.9;call_end_time=1645211875;call_type=A audio;caller=;callee=

Shared auditing information
This information is produced on every machine running any of the Cellcrypt stack services.

SSH / Direct access

Network Device NDcPP Ref Event Where to find it Evidence
FCS_SSHS_ EXT.1 Failure to establish an SSH session /var/ log/ messag es

NTP

Network Device NDcPP Ref Event Where to find it Evidence
FCS_SSHS_ EXT.1 Failure to establish an SSH session /var/ log/ messag es

Hardware information

Network Device NDcPP Ref Event Where to find it Evidence
FAU_GEN.

1/Log

CPU and Memory usage /var/ log/ messag es 2021-12-06T11:09:30.302105-05:00 api-* top: top –

14:41:54 up 19 days, 3:04, 2 users, load average: 0.00,

0.01, 0.05

2021-12-06T11:09:30.302105-05:00 api-* top: Tasks:

182 total, 2 running, 180 sleeping, 0 stopped, 0  zombie

2021-12-06T11:09:30.302105-05:00 api-* top: %Cpu(s):

0.0 us, 6.2 sy, 0.0 ni, 93.8 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st

2021-12-06T11:09:30.302105-05:00 api-* top: KiB

Mem : 1880524 total, 64660 free, 1247988 used,

567876 buff/cache

2021-12-06T11:09:30.302105-05:00 api-* top: KiB

Swap: 0 total, 0 free, 0 used. 352988 avail Mem

2021-12-06T11:09:30.302105-05:00 api-* top: mbie

2021-12-06T11:09:30.302105-05:00 api-* top: PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 2021-12-06T11:09:30.302105-05:00 api-* top: 21324 admin 20 0 162028 2104 1540 R 6.2 0.1 0:00.01 top

2021-12-06T11:09:30.302105-05:00 api-* top: 1 root 20

0 128148 5032 2504 S 0.0 0.3 4:03.70 systemd

2021-12-06T11:09:30.302105-05:00 api-* top: 2 root 20

0 0 0 0 S 0.0 0.0 0:00.36 kthreadd

FAU_GEN.

1/Log

NTP Status /var/ log/ messag es 2021-12-06T11:09:30.302105-05:00 api-* ntpstat:

synchronised to NTP server (204.11.201.10) at stratum 3

2021-12-06T11:09:30.302105-05:00 api-* ntpstat: time

correct to within 37 ms

2021-12-06T11:09:30.302105-05:00 api-* ntpstat:

polling server every 1024 s

FAU_GEN.

1/Log

Disk and file storage capacity /var/ log/ messag es 2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

Filesystem Size Used Avail Use% Mounted on

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h: /

dev/xvda2 10G 3.4G 6.7G 34% /

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

devtmpfs 897M 0 897M 0% /dev

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

tmpfs 919M 0 919M 0% /dev/shm

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

tmpfs 919M 79M 840M 9% /run

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

tmpfs 919M 0 919M 0% /sys/fs/cgroup

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

tmpfs 184M 0 184M 0% /run/user/1000

2021-12-06T11:09:30.302105-05:00 api-* kernel: df -h:

tmpfs 184M 0 184M 0% /run/user/0

General system activity

Network Device NDcPP Ref Event Where to find it Evidence
FAU_GEN.1.1 Start-up and shutdown of the audit functions /var/log/ messages 2021-12-06T11:09:31.340131-05:00 api-*

auditd[1548]: Init complete, auditd 2.8.5 listening for events (startup state enable)

FAU_GEN.1.1 Changes to TSF data related to configuration changes /var/log/ aide/ aide.log
FAU_GEN.1.1 Generating/import of, changing, or deleting of cryptographic keys
FAU_GEN.1.1 Administrative login and /var/log/ Login Report
logout audit/ ===========================================
audit.log =
# date time auid host term exe success event
===========================================
=
1. 08/06/2019 15:50:09 admin 172.31.33.210 /dev/
pts/0 /usr/sbin/sshd yes 919456
2. 08/06/2019 18:13:41 admin 172.31.33.210 /dev/
pts/0 /usr/sbin/sshd yes 919808
3. 08/07/2019 09:17:17 admin 172.31.33.210 /dev/
pts/0 /usr/sbin/sshd yes 921179
4. 08/07/2019 13:24:55 admin 172.31.33.210 /dev/
pts/0 /usr/sbin/sshd yes 921613
 

admin pts/5 172.31.33.210.st Mon Aug 5 19:52 –

23:59 (04:06)
admin pts/2 172.31.33.210.st Tue Aug 6 14:28 –
14:38 (00:09)
admin pts/0 179.184.19.129.s Tue Aug 6 14:20 –
14:43 (00:23)
admin pts/2 172.31.33.210.st Tue Aug 6 14:38 still
logged in
Aug 8 20:40:20 ip-172-31-33-210 sudo:

pam_unix(sudo:session): session opened for user root by admin(uid=0)

Aug 8 20:40:20 ip-172-31-33-210 sudo:

pam_tty_audit(sudo:session): unknown option

`administrator’

Aug 8 20:40:20 ip-172-31-33-210 sudo:

pam_tty_audit(sudo:session): changed status  from 1 to 1

Aug 8 20:41:39 ip-172-31-33-210 sudo:

pam_unix(sudo:session): session closed for user root

Aug 8 20:41:54 ip-172-31-33-210 sudo: admin : TTY=pts/0 ; PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl restart rsyslog

FAU_GEN.1.1/

Log

Current IP connections /var/log/ messages 2021-12-06T11:09:33.134510-05:00 api-* kernel: LOG_IPTABLES_PING_REQUEST: IN=eth0 OUT= MAC=06:d6:65:61:b7:fe:06:b1:01:79:45:47:08:00 SRC=179.184.19.129 DST=172.31.33.210 LEN=84 TOS=0x00 PREC=0x00 TTL=38 ID=6627 DF PROTO=ICMP TYPE=8 CODE=0 ID=32536 SEQ=200
FMT_MOF.1/

ManualUpdat e

Any attempt to initiate a manual update. /var/log/ messages 2021-12-06T18:31:54 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.

2021-12-06T18:32:50 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Running precondition checks.

2021-12-06T18:32:50 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Configuring system.

2021-12-06T18:32:53 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Starting services.

2021-12-06T18:32:53 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Running final checks.

2021-12-06T18:32:53 ip-172-31-33-210 journal: SW

upgrade: #033[1;32mmariadb#033[0m: Installed.

FIA_X509_EXT

.1/ITT

•        Unsuccessful attempt to validate a certificate
•        Any addition, replacement or removal of trust anchors in the TOE’s trust store
FPT_STM_EX T.1 Discontinuous changes to time – either Administrator actuated or changed via an automated process. (Note that no continuous changes to time need to be logged. See also application note on FPT_STM_EXT.1). /var/log/ audit/ audit.log ====================================

# date time exe term host auid event

====================================

332. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd ? ? unset 877714

333. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd-timedated (none) ? unset 877713 334. 08/06/2019 13:23:34 /usr/lib/systemd/ systemd-timedated (none) ? unset 877715 335. 08/06/2019 13:24:04 /usr/lib/systemd/ systemd ? ? unset 877716

336. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd ? ? unset 877729

337. 08/06/2019 13:25:45 /usr/bin/timedatectl pts0 ? admin 877726

338. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877728 339. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877731 340. 08/06/2019 13:25:45 /usr/lib/systemd/ systemd-timedated (none) ? unset 877732

FTA_SSL_EXT

.1 (if “lock the session” is selected)

Any attempts at unlocking of an interactive session.
FTA_SSL_EXT

.1 (if “terminate the session” is selected)

The termination of a local session by the session locking mechanism.
FTA_SSL.3 The termination of a remote session by the session locking mechanism.
FTA_SSL.4 The termination of an interactive session.
FPT_TUD_EX T.2 Failure of update
FIA_UAU.2/TC Successful or failed authentication of trunk connected network component
FAU_STG_EXT

.3/LocSpace

Low storage space for audit events.
FIA_X509_EXT

.1/ITT

•        Unsuccessful attempt to validate a certificate
•        Any addition, replacement or removal of trust anchors in the TOE’s trust store
FPT_ITT.1 • Initiation of the trusted channel.

•        Termination of the trusted channel.

•        Failure of the trusted channel functions.

FTP_TRP.1/

Join

•        Initiation of the trusted path.

•        Termination of the trusted path.

•        Failure of the trusted path functions.

Copyright © Cellcrypt Inc. Each page of this document is subject to the confidentiality provision on the cover page. “CELLCRYPT” is a trademark of Cellcrypt Inc. All other trademarks are registered to their respective owners.

Documents / Resources

Cellcrypt Federal Stack Auditing and Monitoring [pdf] User Guide
Federal Stack Auditing and Monitoring, Federal Stack, Auditing and Monitoring, Monitoring

References

Leave a comment

Your email address will not be published. Required fields are marked *