Security Architecture
Security is at the core of everything LinuxGuard does. Our agent is designed with a zero-trust, least-privilege security model to ensure that the monitoring solution itself never becomes a security risk to your infrastructure.
Security-First Design Principles
LinuxGuard follows industry best practices for secure agent deployment:
No Root Privileges: The agent never runs with root privileges
Dedicated User Account: Operates under its own isolated user account
Least Privilege Access: Read-only access to system components, with write access only to agent-specific files
Minimal Attack Surface: Limited permissions reduce the potential impact of any security incident
Audit Integration: Seamlessly integrates with Linux audit systems for comprehensive monitoring
Installation Security Model
During installation, the LinuxGuard agent sets up a secure, isolated environment that follows the principle of least privilege.
Dedicated User Account
The installer creates a dedicated linuxguard user and group specifically for running the agent. This user account:
Has no login shell (cannot be used for interactive access)
Is a system account (not intended for human users)
Operates with minimal system privileges
Is isolated from other system processes and users
Directory Structure and Permissions
The installer creates a secure directory structure with appropriate ownership and permissions:
Agent-Owned Directories (read-write access):
/etc/linuxguard/- Agent configuration files/var/lib/linuxguard/- Agent state and data files/var/run/linuxguard/- Runtime files and process information/var/log/linuxguard/- Agent log files
All agent-owned directories are:
Owned by the
linuxguarduser and groupProtected with restrictive permissions (750 or 755)
Isolated from other system components
System Component Access (read-only access):
The agent requires read-only access to certain system components for monitoring purposes
This includes system logs, configuration files, and audit data
Read access is granted only where necessary for security monitoring functionality
The agent cannot modify any system files or configurations
Audit System Integration
LinuxGuard integrates with the Linux audit system (auditd) to provide comprehensive security monitoring. The installer:
Installs audit rules that define what events to monitor
Creates a dedicated audit group (
linuxguard-audit) for accessing audit logsConfigures the audit daemon to allow the agent to read audit logs securely
Ensures audit logs are accessible without requiring root privileges
This integration allows LinuxGuard to monitor system calls, file access, network activity, and other security-relevant events without running with elevated privileges.
Service Management
The agent runs as a system service under the linuxguard user account. The installer:
Registers the agent as a system service (systemd or OpenRC, depending on your distribution)
Configures the service to start automatically on system boot
Ensures the service runs with the correct user permissions
Provides standard service management capabilities (start, stop, restart, status)
Runtime Security
Once installed and running, the LinuxGuard agent:
Runs as non-root: All agent processes execute under the
linuxguarduser accountRead-only monitoring: Monitors system activity with read-only access to system components
Isolated data: Stores all agent data in dedicated directories with restricted access
Secure communication: All communication with the LinuxGuard console uses encrypted HTTPS connections
No system modifications: The agent never modifies system files, configurations, or other components outside its own directories
Security Benefits
This security model provides several key benefits:
Reduced Attack Surface: By running without root privileges, the agent cannot be used to escalate privileges or compromise the system
Compliance: The least-privilege model helps meet security compliance requirements
Isolation: Agent processes and data are isolated from other system components
Transparency: Clear separation between agent operations and system operations
Auditability: The agent's own operations can be monitored and audited like any other system process
Verification
You can verify the security configuration after installation:
# Check the agent user exists
id linuxguard
# Verify agent processes run as non-root
ps aux | grep linuxguard-agent
# Check directory permissions
ls -la /etc/linuxguard
ls -la /var/lib/linuxguard
ls -la /var/log/linuxguardAll agent processes should show the linuxguard user, and all agent directories should be owned by linuxguard:linuxguard with appropriate restrictive permissions.
Best Practices
When deploying LinuxGuard in your environment:
Review permissions: Periodically review the agent's file permissions to ensure they remain restrictive
Monitor agent activity: Use your existing security monitoring to track agent behavior
Keep updated: Regularly update the agent to receive security patches and improvements
Network security: Ensure network policies allow the agent to communicate with
api.linuxguard.ioover HTTPSAudit logs: Review agent logs regularly to ensure normal operation
Related: Installation | Troubleshooting
Last updated
Was this helpful?