System authentication files modified

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect modifications to pam.d directory.

Strategy

Linux Pluggable Authentication Modules (PAM) provide authentication for applications and services. Authentication modules in the PAM system are setup and configured under the /etc/pam.d/ directory. An attacker may attempt to modify or add an authentication module in PAM in order to bypass the authentication process, or reveal system credentials.

Triage and response

  1. Identify if the changes to the path {{@file.path}} were part of known system setup or mainenance.
  2. If these changes were unauthorized, roll back the host in question to a known good PAM configuration, or replace the system with a known-good system image.

Required agent version 7.27 or higher