UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not be used as a syslog server (loghost) for systems external to the enclave.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12020 GEN005440 SV-37810r1_rule ECSC-1 Medium
Description
Syslog messages are typically unencrypted, may contain sensitive information, and are restricted to the enclave.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2013-01-17

Details

Check Text ( C-37010r1_chk )
Ask the SA if the loghost server is collecting data for hosts outside the local enclave. If it is, this is a finding.

Fix Text (F-32274r1_fix)
Configure the hosts outside of the local enclave to not log to this system.