UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

RHEL 9 must be configured to offload audit records onto a different system from the system being audited via syslog.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258145 RHEL-09-652035 SV-258145r958754_rule Medium
Description
The auditd service does not include the ability to send audit records to a centralized server for management directly. However, it can use a plug-in for audit event multiplexor (audispd) to pass audit records to the local syslog server. Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224
STIG Date
Red Hat Enterprise Linux 9 Security Technical Implementation Guide 2024-06-04

Details

Check Text ( C-61886r926420_chk )
Verify RHEL 9 is configured use the audisp-remote syslog service with the following command:

$ sudo grep active /etc/audit/plugins.d/syslog.conf

active = yes

If the "active" keyword does not have a value of "yes", the line is commented out, or the line is missing, this is a finding.
Fix Text (F-61810r926421_fix)
Edit the /etc/audit/plugins.d/syslog.conf file and add or update the "active" option:

active = yes

The audit daemon must be restarted for changes to take effect.