Suppose and admin needs to access a machine remotely.Root logins are disabled but he belongs to the sudoers list. I read that "sudo command" is good practice because you don't forget you are using root and also, sudo logs commands (this was the surprising part for me). I need to keep track of admin commands but the fact the he can escalate to root makes the task complicated because he can just delete the logs. I was thinking of using selinux to help me here. I know this question sounds strange but:
Is there a way to limit some accesses to an admin that belongs to the sudoers list or at least protect the logs of his actions?
The admin can only access remotely and no root access is directly allowed. I give these rules because it could be possible to limit accesses to the admin based on the shell spawned.
Kind regards