PHTN-30-000007 - The Photon operating system must have sshd authentication logging enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities.

Shipping sshd authentication events to syslog allows organizations to use their log aggregators to correlate forensic activities among multiple systems.

Solution

Navigate to and open:

/etc/rsyslog.conf

Add the following line:

authpriv.* /var/log/auth.log

Note: The path can be substituted for another suitable log destination.

At the command line, run the following command:

# systemctl restart rsyslog.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000067, Rule-ID|SV-256484r887126_rule, STIG-ID|PHTN-30-000007, Vuln-ID|V-256484

Plugin: Unix

Control ID: 32bd540827954ffb916e91bb572fcf71df08914d4ce928b48ed60139bca43fba