1.362 RHEL-09-652040

Information

RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.

GROUP ID: V-258146
RULE ID: SV-258146r1045288

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Offloading is a common process in information systems with limited audit storage capacity.

RHEL 9 installation media provides "rsyslogd", a system utility providing support for message logging. Support for both internet and Unix domain sockets enables this utility to support both local and remote logging. Coupling this utility with "gnutls" (a secure communications library implementing the SSL, TLS and DTLS protocols) creates a method to securely encrypt and offload auditing.

"Rsyslog" supported authentication modes include:anon - anonymous authenticationx509/fingerprint - certificate fingerprint authenticationx509/certvalid - certificate validation onlyx509/name - certificate validation and subject name authentication

Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure RHEL 9 to authenticate the remote logging server for offloading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf":

$ActionSendStreamDriverAuthMode x509/name

See Also

https://workbench.cisecurity.org/benchmarks/22008

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), CAT|II, CCI|CCI-001851, Rule-ID|SV-258146r1045288_rule, STIG-ID|RHEL-09-652040, Vuln-ID|V-258146

Plugin: Unix

Control ID: c03ae4676b00ed25744ddb3cf0bd60131791eede221b80c2901da2a51cffd57e