Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-256484 | PHTN-30-000007 | SV-256484r887126_rule | Medium |
Description |
---|
Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities. Shipping sshd authentication events to syslog allows organizations to use their log aggregators to correlate forensic activities among multiple systems. |
STIG | Date |
---|---|
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide | 2023-02-21 |
Check Text ( C-60159r887124_chk ) |
---|
At the command line, run the following command: # grep "^authpriv" /etc/rsyslog.conf Expected result should be similar to the following: authpriv.* /var/log/auth.log If "authpriv" is not configured to be logged, this is a finding. |
Fix Text (F-60102r887125_fix) |
---|
Navigate to and open: /etc/rsyslog.conf Add the following line: authpriv.* /var/log/auth.log Note: The path can be substituted for another suitable log destination. At the command line, run the following command: # systemctl restart rsyslog.service |