Kernel Modules (sec-kernel)

Monitors loaded kernel modules and the kernel taint status. Detects newly loaded modules and unusual kernel states.

Configuration

ParameterTypeDefaultDescription
enabledbooltrueEnable/disable module
allowed_moduleslist[]Expected modules (baseline). Empty = automatic baseline on first run.
check_taintbooltrueCheck kernel taint flags
allowed_taint_moduleslist[]Modules allowed to cause taint status

YAML Example

sec_kernel:
  enabled: true
  check_taint: true
  allowed_taint_modules:
    - "nvidia"
    - "vboxdrv"

Diagnostic Codes

CodeSeverityMeaningRecommendation
75000No kernel issues detected
75011New kernel module loadedVerify module or add to baseline
75021Kernel is taintedInvestigate taint source (proprietary modules?)
75030Module recently loaded (dmesg)Informational — review module

Platform Support

  • Linux: Reads /proc/modules, /proc/sys/kernel/tainted, and dmesg.
  • Windows: Not available (Linux only).