RHEL-08-030690 - The RHEL 8 audit records must be off-loaded onto a different system or storage media from the system being audited.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Off-loading is a common process in information systems with limited audit storage capacity.

RHEL 8 installation media provides 'rsyslogd'. 'rsyslogd' is a system utility providing support for message logging. Support for both internet and UNIX domain sockets enables this utility to support both local and remote logging. Couple this utility with 'gnutls' (which is a secure communications library implementing the SSL, TLS and DTLS protocols), and you have a method to securely encrypt and off-load auditing.

Rsyslog provides three ways to forward message: the traditional UDP transport, which is extremely lossy but standard; the plain TCP based transport, which loses messages only during certain situations but is widely available; and the RELP transport, which does not lose messages but is currently available only as part of the rsyslogd 3.15.0 and above.
Examples of each configuration:
UDP *.* @remotesystemname
TCP *.* @@remotesystemname
RELP *.* :omrelp:remotesystemname:2514
Note that a port number was given as there is no standard port for RELP.

Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

Solution

Configure the operating system to offload audit records onto a different system or media from the system being audited by specifying the remote logging server in '/etc/rsyslog.conf' or '/etc/rsyslog.d/[customfile].conf' with the name or IP address of the log aggregation server.

For UDP:
*.* @[logaggregationserver.example.mil]:[port]

For TCP:
*.* @@[logaggregationserver.example.mil]:[port]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_8_V1R13_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001851, Rule-ID|SV-230479r917883_rule, STIG-ID|RHEL-08-030690, Vuln-ID|V-230479

Plugin: Unix

Control ID: 638ca1beeb86fad5c1a29ea734a66fc6aaf5fa5c92f82e412ecd321af436d7e2