SELinux logging and auditing
SELinux developers understand that a security-oriented subsystem such as SELinux can only succeed if it is capable of enhanced logging and—even—debugging. Every action that SELinux takes, as part of the LSM hooks that it implements, should be auditable. Denials (actions that SELinux prevents) should always be logged so that administrators can take due action. SELinux tuning and changes, such as loading new policies or altering SELinux Booleans, should always result in an audit event.
Following audit events
By default, SELinux will send its messages to the Linux audit subsystem (assuming the Linux kernel is configured with the audit subsystem enabled through the CONFIG_AUDIT
kernel configuration). There, the messages are picked up by the Linux audit daemon (auditd
) and logged in the /var/log/audit/audit.log
file. Distributions and administrators can define additional handling rules by configuring the audit dispatcher process (audisp
)...