You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When Falco is configured to log EXECVE calls it is not possible to track ID of actual executing user - %user.name returns root and %user.uid return 0.
But Linux auditing system always provides an identity of actual executing user via auid field.
So if user with ID = 1002 runs
$ sudo su
$ touch /bin/myfile12
the Falco log with rule
- rule: All the commands executed by users
desc: an attempt to run interactive commands by any user
condition: spawned_process
output: "User ran an interactive command (user=%user.name uid=%user.uid command=%proc.cmdline)"
priority: INFO
tags: [users]
looks like this
01:54:28.826846427: Informational User ran an interactive command (user=root uid=0 command=touch /bin/myfile12)
while audit record looks like this (note auid=1002 there) which makes it easy to correlate which user run this command as sudo and provide automated response if suspicious activity is spotted