AZLX-23-001040 - Amazon Linux 2023 must have the rsyslog package installed.

Information

Successful incident response and auditing relies on timely, accurate system information and analysis allow the organization to identify and respond to potential incidents in a proficient manner. If Amazon Linux 2023 does not provide the ability to centrally review Amazon Linux 2023 logs, forensic analysis is negatively impacted.

Segregation of logging data to multiple disparate computer systems is counterproductive and makes log analysis and log event alarming difficult to implement and manage, particularly when the system has multiple logging components writing to different locations or systems.

To support the centralized capability, Amazon Linux 2023 must be able to provide the information in a format that can be extracted and used, allowing the application performing the centralization of the log records to meet this requirement.

Satisfies: SRG-OS-000051-GPOS-00024, SRG-OS-000479-GPOS-00224

Solution

Configure Amazon Linux 2023 to monitor all remote access methods by installing rsyslog with the following command:

$ sudo dnf install -y rsyslog

Enable the log service with the following command:

$ sudo systemctl enable --now rsyslog

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Amazon_Linux_2023_V1R2_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), 800-53|AU-6(4), CAT|II, CCI|CCI-000154, CCI|CCI-001851, Rule-ID|SV-274020r1155173_rule, STIG-ID|AZLX-23-001040, Vuln-ID|V-274020

Plugin: Unix

Control ID: 307f5e95a98936decd17a1b9698490d9d597499cd8b3665e76578adcfe4d10ac