UCF STIG Viewer Logo

The HPE 3PAR OS must be configured to offload audit records onto a different system or media from the system being audited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255284 HP3P-33-002052 SV-255284r877390_rule Medium
Description
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224
STIG Date
HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide 2023-11-30

Details

Check Text ( C-58957r870169_chk )
Verify offloading of security syslog events with

cli% showsys -d

Find the output section "Remote Syslog Status".

If "Active" is not "1", this is a finding.

If "Security Server" is not defined, this is a finding.

If "Security Connection" is not "TLS", this is a finding.
Fix Text (F-58901r870170_fix)
Configure the remote syslog host:

cli% setsys RemoteSyslogSecurityHost [:port]

The hostname, and address are both required. If both IPv4 and IPv6 addresses are supplied, the IPv6 address must be enclosed in []. The default port is 6514 utilizing TLS.

Import the ca certificate that will have signed the syslog server:

cli% importcert syslog-sec-server -ca stdin

Copy and paste the PEM format of the appropriate CA as instructed.

Configure the system to utilize remote syslog:

cli% setsys RemoteSyslog 1