UCF STIG Viewer Logo

The system must log informational authentication data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12004 GEN003660 SV-45755r1_rule Medium
Description
Monitoring and recording successful and unsuccessful logins assists in tracking unauthorized access to the system.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-43108r1_chk )
Check /etc/rsyslog.conf and verify the auth facility is logging both the notice and info level messages by:

# grep “auth.notice” /etc/rsyslog.conf
# grep “auth.info” /etc/rsyslog.conf
or
# grep 'auth.*' /etc/rsyslog.conf

If auth.* is not found, and either auth.notice or auth.info is not found, this is a finding.
Fix Text (F-39154r1_fix)
Edit /etc/rsyslog.conf and add local log destinations for auth.* or both auth.notice and auth.info.