Audit events

An audit event is any security-relevant occurrence in the system. A security-relevant occurrence can be a change to the security state of the system, an attempted or actual violation of the system access control or accountability security policies, or both. The programs and kernel modules that detect audit events report these events to the system audit logger that runs as part of the kernel. This audit event report can be accessed either by using a subroutine (for trusted program auditing) or within a kernel procedure call (for supervisor state auditing). The information that is reported in an audit event includes the name of the event, the success or failure of the event, and any additional event-specific information that is related to security auditing.

To audit an activity, you must identify the command or process that initiates the audit event and ensure that the event is listed in the /etc/security/audit/events file for your system. You can facilitate the assignment of audit events to users by combining similar events into audit classes. These audit classes are defined in the classes stanza of the /etc/security/audit/config file.

The following table lists some of the commonly used audit events that occur in the AIX® operation system:

Table 1. Audit events
User or system call Audit event Description
fork PROC_Create Specifies that a process is created.
exit PROC_Delete Specifies that the calling process ended.
exec PROC_Execute Runs a new program.
setuidx PROC_RealUID Sets the user ID of the process.
PROC_AuditID
PROC_SetUserIDs
setgidx PROC_RealGID Sets the process group ID.
setroles PROC_SetRoles Entry point for setting role IDs.
accessx FILE_Accessx Determines the accessibility of a file.
statacl FILE_StatAcl Retrieves the access control information of a file.
revoke FILE_Revoke Revokes access to a file by all processes.
frevoke FILE_Frevoke Revokes access to a file by other processes.
usrinfo PROC_Environ Changes a part of user information data.
setrlimit PROC_Limits Controls consumption of maximum system resources.
nice PROC_SetPri Specifies the use of the nice function.
setpri PROC_Setpri Sets fixed priority for processes.
setpriv PROC_Privilege Changes one or more privilege vectors for processes.
settimer PROC_Settimer Sets current value for a specified system-wide timer.
adjtime PROC_Adjtime Changes the system clock.
ptrace PROC_Debug Traces the execution of another process.
kill PROC_Kill Sends a signal to a process or a group of processes.
setpgid PROC_setpgid Sets the process group ID.
ld_loadmodule PROC_Load Loads a new object module into the process address space.
PROC_LoadError Indicates that the object loading failed.
setgroups PROC_SetGroups Changes the process concurrent group set.
sysconfig PROC_Sysconfig Captures the action on kernel or system configuration.
audit AUD_It Starts and stops the auditing operation. It also queries the audit status.
auditbin AUD_Bin_Def Modifies the auditbin system call.
auditevents AUD_Events Modifies events.
auditobj AUD_Objects Modifies the auditobj system call.
auditproc AUD_Proc Gets or sets the audit state of a process.
acct ACCT_Disable Disables system accounting.
ACCT_Enable Enables system accounting.
open and create FILE_Open Calls the open subroutine.
read FILE_Read Reads data from the file descriptor.
write FILE_Write Writes data to the file descriptor.
close FILE_Close Closes the open file descriptor.
link FILE_Link Creates new directory entry for a file system object.
unlink FILE_Unlink Removes a file system object.
rename FILE_Rename Changes the name of a file system object.
chown FILE_Owner Changes file ownership.
chmod FILE_Mode Changes file mode.
fchmod FILE_Fchmod Changes file permission of a file descriptor.
fchown FILE_Fchown Changes ownership of a file descriptor.
truncate FILE_Truncate Changes the length of regular files or shared memory object.
symlink FILE_Symlink Creates a symbolic link.
pipe FILE_Pipe Creates an unnamed pipe.
mknod FILE_Mknod Creates a device special file or a first-in-first-out (FIFO) special file.
fcntl FILE_Dupfd Duplicates the file descriptor.
fscntl FS_Extend Extends the file system.
mount FS_Mount Connects file system to a named directory.
umount FS_Umount Disconnects the mounted file system.
chacl FILE_Acl Changes the access control list (ACL) of a file.
fchacl FILE_Facl Changes ACL of a file descriptor.
chpriv FILE_Privilege Sets the privilege control list (PCL) of a file path name.
FILE_Chpriv Changes the PCL.
FILE_Fchpriv Changes the PCL of a file descriptor.
chdir FS_Chdir Changes the current working directory.
fchdir FS_Fchdir Changes the current working directory by using a file descriptor.
chroot FS_Chroot Changes meaning of the root directory (/) for the current process.
rmdir FS_Rmdir Removes the directory object.
mkdir FS_Mkdir Creates a directory.
utimes FILE_Utimes Calls the utimes subroutine.
stat FILE_Stat Calls the stat subroutine.
msgget MSG_Create Creates a message queue.
msgrcv MSG_Read Receives message from a message queue.
msgsnd MSG_Write Sends message to a message queue.
msgctl MSG_Delete Removes a message queue.
MSG_Owner Changes ownership and access right of a message queue.
MSG_Mode Queries access rights of a message queue.
semget SEM_Create Creates a semaphore set.
semop SEM_Op Increases or decreases one or more semaphores.
semctl SEM_Delete Deletes a semaphore set.
SEM_Owner Changes ownership and access rights of a semaphore set.
SEM_Mode Queries semaphore set access rights.
shmget SHM_Create Creates a new shared memory segment.
shmat SHM_Open Calls the shmat subroutine by using the Open option.
shmat SHM_Detach Calls the shmat subroutine by using the Detach option.
shmctl SHM_Close Closes shared memory segment.
SHM_Owner Changes ownership and access rights for shared memory segment.
SHM_Mode Queries access rights of shared memory segment.
tcpip user level TCPIP_connect Calls the connect subroutine.
TCPIP_data_out Data sent.
TCPIP_data_in Data received.
TCPIP_set_time Logs the attempt to change system time through network.
tcpip kernel level TCP_ksocket Specifies that a socket is created.
TCP_ksocketpair Specifies that a pair of connected sockets is created.
TCP_kclose Specifies that the socket is closed.
TCP_ksetopt Specifies that the socket options are set.
TCP_kbind Specifies that a name is bound to a socket.
TCP_klisten Listens for a socket connection.
TCP_kconnect Specifies that a connection between two sockets is created.
TCP_kaccept Accepts a new socket and specifies that a connection on a socket is created.
TCP_kshutdown Specifies that all send and receive operations of sockets are shut down.
TCP_ksend Specifies that messages are sent from a connected socket.
TCP_kreceive Specifies that messages are received from a connected socket.
tsm USER_Login Logs in the user to the system.
PORT_Locked Indicates that the port is locked because of invalid login attempts.
TERM_Logout Logs the user out of the system.
rlogind or telnetd USER_Exit Indicates that the user is logged out.
usrck USER_Check Verifies the accuracy of a user definition.
USRCK_Error
USER_Locked User is locked after failed login attempts.
logout USER_Logout Stops all processes on a port.
chpass USER_Chpass User password changed.
chsec PORT_Change Indicates a change in port attribute values.
USER_Unlocked User unlocked by administrator.
LPA_Change Password algorithm changed.
SECORDER_Change Change secorder in /etc/nscontrol.conf.
chuser USER_Change Changes user attributes.
rmuser USER_Remove Removes a user.
mkuser USER_Create Creates a user.
setgroups USER_SetGroups Sets the supplementary group ID of the current process.
setsenv USER_SetEnv Sets the environment variable.
su USER_SU Changes the user ID that is associated with a session.
grpck GROUP_User Removes nonexistent users from the group.
GROUP_Adms Removes nonexistent administrative users from the group.
chgroup GROUP_Change Changes the group attributes.
mkgroup GROUP_Create Creates a group.
rmgroup GROUP_Remove Removes a group.
passwd PASSWORD_Change Changes a user password.
pwdadm PASSWORD_Flags Changes an administrator password.
pwdck PASSWORD_Check Verifies the accuracy of local authentication information.
PASWORD_Ckerr
startsrc SRC_Start Starts a system resource controller.
stopsrc SRC_Stop Stops a system resource controller.
addssys SRC_Addssys Adds the SRCsubsys definition to the subsystem object class.
chssys SRC_Chssys Changes a subsystem definition in the subsystem object class.
addserver SRC_Addserver Adds a subserver definition to the subserver object class.
chserver SRC_Chserver Changes a subserver definition in the subserver object class.
rmsys SRC_Delssys Removes a subsystem definition from the subsystem object class.
rmserver SRC_Delserver Removes a subserver definition from the Subserver type object class.
enq ENQUE_admin Queues a file.
qdaemon ENQUE_exec Schedules queued jobs.
sendmail SENDMAIL_Config Routes the mail for local or network delivery.
SENDMAIL_ToFile
at AT_JobAdd Removes or adds the commands that are scheduled to be run by using the at command.
At_JobRemove
cron CRON_JobRemove Removes or adds the commands that are scheduled to be run by using the cron command.
CRON_JobAdd
CRON_Start Indicates start of a cron job.
CRON_Finish Indicates end of a cron job.
nvload NVRAM_Config Specifies access to the nonvolatile random-access memory (NVRAM).
cfgmgr DEV_Configure Configures devices.
chdev and mkdev DEV_Change Specifies a change in device.
mkdev DEV_Create Specifies that the device is created.
DEV_Start Specifies that the device is started.
installp INSTALLP_Inst Installs available software products in a compatible installation package.
INSTALLP_Exec
rmdev DEV_Stop Specifies that the device is stopped.
DEV_Unconfigure Specifies that the device is unconfigured.
DEV_Remove Specifies that the device is removed.
lchangelv, lextendlv, and lreducelv LVM_ChangeLV Specifies that the logical volume is changed.
lchangepv, ldeletepv, and linstallpv LVM_ChangeVG Specifies that the volume group is changed.
lcreatelv LVM_CreateLV Specifies that a logical volume is added to the system.
lcreatevg LVM_CreateVG Specifies that a volume group is created in the system.
ldeletepv LVM_DeleteVG Specifies that the volume group is removed from the system.
rmlv LVM_DeleteLV Specifies that the logical volume is removed from the system.
lvaryoffvg LVM_VaryoffVG Deactivates a volume group.
lvaryonvg LVM_VaryonVG Activates a volume group.
Logical volume operations LVM_AddLV Adds a logical volume to an existing volume group.
LVM_KDeleteLV Removes a logical volume from an existing volume group.
LVM_ExtendLV Increases the size of a logical volume by adding deallocated physical partitions from the volume group.
LVM_ReduceLV Decreases the size of a logical volume.
LVM_KChangeLV Changes existing logical volume.
LVM_AvoidLV Does not allow a logical volume to perform specific operations.
Physical volume operations LVM_MissingPV Adds a missing physical volume to an existing volume group.
LVM_AddPV Adds a physical volume to an existing volume group
LVM_AddMissPV Adds a missing physical volume to an existing volume group.
LVM_DeletePV Deletes a physical volume from an existing volume group.
LVM_RemovePV Removes a physical volume from an existing volume group.
LVM_AddVGSA Adds a volume group status area (VGSA) to an existing physical volume.
LVM_DeleteVGSA Removes a VGSA from an existing physical volume.
Volume group operations LVM_SetupVG Sets up the volume group by defining logical volumes and by specifying information about the VGSA and mirror write consistency cache (MWCC).
LVM_DefineVG Defines the volume group to the kernel.
LVM_KDeleteVG Deletes a volume group from the kernel.
Backup and restore operations BACKUP_Export Captures the progress of the backup operation.
RESTORE_Import Captures the progress of the restore operation.
shell USER_Shell Captures the user tty information.
reboot USER_Reboot Captures the event of system reboot.
PROC_Reboot Captures the event of process reboot. The reboot subroutine restarts the system or repeats the initial program load (IPL) operation on the system.
/usr/sbin/init INIT_Start A process in the init tab is started.
INIT_End A process in the init tab is ended.
/usr/sbin/setsecattr PROC_Change A process privilege is changed.
mkrole ROLE_Create A new role is created.
chrole Role_Change The attributes of an existing role are changed.
rmrole Role_Remove A role is removed.
start of changeInternet Protocol Security (IPsec) operationsend of change IPSEC_p1_sa Lists the attributes that establish the security association for the key tunnel. Key tunnel or control plane tunnel is the tunnel that controls how data is sent from one place to another.
IPSEC_p2_sa Lists the attributes that establish the security association for the data tunnel. Data tunnel or data plane tunnel is the tunnel that is used for the actual transport of data.
IPSEC_ike_ver Specifies the negotiated version of the Internet Key Exchange (IKE). The valid values are IKEv1 and IKEv2.
IPSEC_auth_type Specifies the authentication mechanism that is used to identify the remote endpoints. The valid values are AUTH_PSK (pre-shared key), AUTH_RSA (RSA_signatures), AUTH_KRB (GSSAPI_krb5), and AUTH_ECDSA (ECDSA256_signatures).
IPSEC_noprp_ack Notifies about the failure event. The failure notification event is logged only when all proposals are rejected by the remote endpoints and the IKE responder device replies with the NO_PROPOSAL_CHOSEN log message.
IPSEC_chtun Specifies that one or more tunnel definitions were changed.
IPSEC_gentun Specifies that a tunnel definition was added to the tunnel database.
IPSEC_imptun Specifies that one or more tunnel definitions were imported into the tunnel database.
IPSEC_lstun Specifies that tunnel definitions were queried from the tunnel database.
start of changeInternet Protocol Security (IPsec) operations continued...end of change IPSEC_mktun Specifies that one or more tunnels were activated.
IPSEC_rmtun Specifies that one or more tunnels were deactivated.
IPSEC_chfilt Specifies that one or more filter definitions were changed in the filter rules table.
IPSEC_expfilt Specifies that one or more filter definitions were exported from the filter rules table to the file system.
IPSEC_genfilt Specifies that a filter rule was added to the filter rules table.
IPSEC_trcbuf Specifies that the ipsectrcbuf command was used to inspect the resident trace buffer for debugging any functional issues in the IPsec subsystem.
IPSEC_impfilt Specifies that one or more filter rules were imported into the filter rule database from one or more text files.
IPSEC_lsfilt Specifies that a request was made to collect the filter rules along with their status.
IPSEC_mkfilt Specifies that an activation request was made for toggling filter rule status.
start of changeInternet Protocol Security (IPsec) operations continued...end of change IPSEC_mvfilt Specifies that the order of the filter rule table was altered.
IPSEC_rmfilt Specifies that one or more entries were removed from the filter rule table.
IPSEC_unload Specifies that a cryptography module was unloaded from the IPsec subsystem.
IPSEC_stat Specifies that the IP Security subsystem status was queried by using the ipsecstat command.
IKE_tnl_creat Specifies that the phase 1 or phase 2 tunnel was created. The event state notifies the status of the tunnel creation operation.
IKE_tnl_delet Specifies that the phase 1 or phase 2 tunnel was deleted. The event state notifies the status of the tunnel deletion operation.
IKE_activat_cmd Specifies that the phase 1 or phase 2 tunnel activation was requested. The event state notifies the status of the tunnel activation request.
IKE_remove_cmd Specifies that the phase 1 or phase 2 tunnel deletion was requested. The event state notifies the status of the tunnel deletion request.