SELinux / AppArmor Security Logs

LinuxSystem ConfigurationDisk ImageSIEM / Log Aggregator

Location

/var/log/audit/audit.log (SELinux AVC messages) or /var/log/kern.log, /var/log/syslog (AppArmor messages)

Description

Mandatory Access Control (MAC) framework logs from SELinux (AVC denial messages in audit.log) or AppArmor (DENIED messages in kern.log/syslog). Record policy violations where processes attempted operations beyond their confined permissions.

Forensic Value

MAC denial logs detect processes attempting to break out of their security confines, which is a hallmark of exploitation and privilege escalation. SELinux AVC denials record the exact operation blocked, the source process, and the target resource. A sudden increase in denials or denials for critical system processes indicates active exploitation. Checking the current enforcement mode (getenforce/aa-status) reveals if an attacker disabled MAC protections.

Tools Required

ausearch -m AVCsealertaa-statusgrepjournalctl

Collection Commands

ausearch

ausearch -m AVC -ts recent > /forensics/output/selinux_avc.txt

grep

grep "apparmor.*DENIED" /var/log/syslog > /forensics/output/apparmor_denied.log

aa-status

aa-status > /forensics/output/apparmor_status.txt

cp

cp /etc/selinux/config /forensics/output/selinux_config.txt

Collection Constraints

  • Paths and log sources vary by distribution, init system, logging stack, and installed packages. Validate the active distro and service set before treating absence as meaningful.
  • Centralized log copies may normalize, truncate, or drop fields relative to the original on-host artifact. Preserve the local source when scope and access permit.

MITRE ATT&CK Techniques

T1068T1562.001T1548.001