Ubuntu日志安全策略实施要点
一 基础架构与日志采集
sudo apt update && sudo apt install rsyslog && sudo systemctl enable --now rsyslog。sudo mkdir -p /var/log/journal && sudo systemctl restart systemd-journald。/etc/rsyslog.d/50-default.conf 或自定义文件):
auth,authpriv.* /var/log/auth.log*.* /var/log/sysloglocal0.* /var/log/myapp.logsudo systemctl restart rsyslog。二 访问控制与传输加密
sudo chmod 640 /var/log/syslog /var/log/auth.log && sudo chown root:adm /var/log/syslog /var/log/auth.log。sudo chmod 700 /var/log/audit && sudo chown root:adm /var/log/audit。sudo setfacl -m g:adm:r /var/log/auth.log。sudo openssl req -newkey rsa:2048 -x509 -days 3650 -keyout /etc/ssl/private/rsyslog.key -out /etc/ssl/certs/rsyslog.crtsudo ufw allow from 192.168.1.0/24 to any port 514 proto udpAllowedSender 明确允许的主机/网段。三 完整性保护与审计追踪
gpg --detach-sign /var/log/syslog,定期校验签名是否被篡改。/var/log 与 /var/log/audit 的异常变更。sudo apt install auditd audispd-plugins && sudo systemctl enable --now auditd/etc/audit/rules.d/audit.rules):
-a exit,always -F arch=b64 -S execve -S execveat -k executed-process -a exit,always -F path=/usr/bin/sudo -F perm=x -k sudo_usage -w /etc/passwd -p rwxa -k passwd_accesssudo ausearch -k executed-process、sudo aureport -k。四 存储保留与轮转策略
/etc/logrotate.d/rsyslog):
/var/log/syslog { daily; rotate 7; compress; missingok; notifempty; create 640 root adm; postrotate /usr/lib/rsyslog/rsyslog-rotate ; endscript }/etc/logrotate.d/audit):
/var/log/audit/*.log { daily; rotate 30; compress; missingok; notifempty; sharedscripts; postrotate /usr/lib/rsyslog/rsyslog-rotate ; endscript }五 监控告警与合规检查
sudo apt install lynis && sudo lynis audit systemsudo apt install libopenscap8 后按需扫描。