Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Security recommendation

ImpactRemediation complexitySeverityRecommended value
323Monitor and investigate all interactive user creation activities

Interactive user account creation should be monitored and investigated to detect unauthorized account creation, privilege escalation attempts, and persistence mechanisms. User creation activities should align with organizational onboarding and access management policies.

Compliance

Documentation

Interactive user account creation involves creating new user accounts on Linux systems through commands like useradd or adduser executed from an interactive terminal (TTY).

Remediation

Prerequisites

You must have:

  • root or sudo privileges to investigate user creation
  • Access to system audit logs and authentication logs
  • Knowledge of authorized user provisioning procedures
  • Understanding of organizational access management policies
  • Agent v7.27 or newer for Workload Security monitoring

Step-by-step guide

Step 1: Investigate the user creation

Identify which user was created, by whom, and when:

# Check authentication logs for user creation commands
sudo grep -E "useradd|adduser" /var/log/auth.log | tail -20

# Review audit logs for user creation activities
sudo ausearch -m ADD_USER -ts recent
sudo ausearch -m USER_MGMT -ts recent

# Check recent user account additions
sudo cat /etc/passwd | tail -10

# Review command history for the administrator who created the user
sudo cat /root/.bash_history | grep -E "useradd|adduser"

# Check when the user account was created
sudo ls -la /home/ | grep [username]

Step 2: Verify authorization

Determine if the user creation was authorized:

  • Verify with HR or management for employee onboarding
  • Review change management tickets or approval records
  • Check if the creation aligns with access provisioning policies
  • Contact the administrator who created the account