GEN001060 - The system must log successful and unsuccessful access to the root account - rsyslog 'authpriv.*'

Information

If successful and unsuccessful logins and logouts are not monitored or recorded, access attempts cannot be tracked. Without this logging, it may be impossible to track unauthorized access to the system.

Solution

Troubleshoot the system logging configuration to provide for logging of root account login attempts.

Procedure:

Edit /etc/syslog.conf or /etc/rsyslog.conf to make sure 'authpriv.*' messages are directed to a file or remote system.

Examine /etc/audit/audit.rules to ensure user authentication messages have not been specifically excluded.

Remove any entries that correspond to:

-a exclude,never -Fmsgtype=USER_START
-a exclude,never -Fmsgtype=USER_LOGIN
-a exclude,never -Fmsgtype=USER_AUTH
-a exclude,never -Fmsgtype=USER_END
-a exclude,never -Fmsgtype=USER_ACCT

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

References: 800-53|AU-2d., 800-53|CM-6b., CAT|II, CCI|CCI-000126, CCI|CCI-000366, Rule-ID|SV-218256r603259_rule, STIG-ID|GEN001060, STIG-Legacy|SV-64435, STIG-Legacy|V-11980, Vuln-ID|V-218256

Plugin: Unix

Control ID: 5f6bc2ee8d6a59104baccee00548872a81e423c4a6e12edbb0353606afd55c72