Better security auditing with Auditd and the Integrity Measurement Architecture
Sometimes event logs are not enough, and you need to supply your security systems with something more. For instance, you might want to improve the detection of anomalies or facilitate the hunt for an intruder on your network. Many commercial solutions are available for file integrity monitoring in Linux. However, some budgets don't allow for a large investment. The good news is that Linux systems have a great selection of open source tools for securing systems, and these tools provide a means for maintaining file integrity at low cost. The Integrity Measurement Architecture comes in handy.
Integrity Measurement Architecture (IMA) [1] is a component of the Linux kernel's integrity subsystem (see the "Components of the Integrity Subsystem" box.) IMA is responsible for calculating hashes of files before loading them, and it supports reporting on the hashes. The integrity subsystem also consists of an Extended Verification Module (EVM) that detects tampering with offline security attribute extensions (e.g., SELinux), which are the basis for clearance decisions of the Linux Security Modules (LSM) framework.
What Is IMA?
The main purpose of IMA is to detect if files have been accidentally or intentionally changed, evaluate the measurement of a file against a value stored as an extension attribute, and enforce the integrity of local files. These objectives are complemented by Mandatory Access Control (MAC) protections provided by LSM modules such as SELinux and Smack.
[...]
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
    Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
 
	
News
- 
		    					    		    Fedora 43 Has Finally LandedThe Fedora Linux developers have announced their latest release, Fedora 43. 
- 
		    					    		    KDE Unleashes Plasma 6.5The Plasma 6.5 desktop environment is now available with new features, improvements, and the usual bug fixes. 
- 
		    					    		    Xubuntu Site Possibly HackedIt appears that the Xubuntu site was hacked and briefly served up a malicious ZIP file from its download page. 
- 
		    					    		    LMDE 7 Now AvailableLinux Mint Debian Edition, version 7, has been officially released and is based on upstream Debian. 
- 
		    					    		    Linux Kernel 6.16 Reaches EOLLinux kernel 6.16 has reached its end of life, which means you'll need to upgrade to the next stable release, Linux kernel 6.17. 
- 
		    					    		    Amazon Ditches Android for a Linux-Based OSAmazon has migrated from Android to the Linux-based Vega OS for its Fire TV. 
- 
		    					    		    Cairo Dock 3.6 Now Available for More CompositorsIf you're a fan of third-party desktop docks, then the latest release of Cairo Dock with Wayland support is for you. 
- 
		    					    		    System76 Unleashes Pop!_OS 24.04 BetaSystem76's first beta of Pop!_OS 24.04 is an impressive feat. 
- 
		    					    		    Linux Kernel 6.17 is AvailableLinus Torvalds has announced that the latest kernel has been released with plenty of core improvements and even more hardware support. 
- 
		    					    		    Kali Linux 2025.3 Released with New Hacking ToolsIf you're a Kali Linux fan, you'll be glad to know that the third release of this famous pen-testing distribution is now available with updates for key components. 




