Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-258865 | PHTN-40-000200 | SV-258865r933656_rule | Medium |
Description |
---|
Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities. Shipping sshd authentication events to syslog allows organizations to use their log aggregators to correlate forensic activities among multiple systems. |
STIG | Date |
---|---|
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide | 2023-10-29 |
Check Text ( C-62605r933654_chk ) |
---|
At the command line, run the following command to verify the running configuration of sshd: # sshd -T|&grep -i SyslogFacility Example result: syslogfacility AUTHPRIV If "syslogfacility" is not set to "AUTH" or "AUTHPRIV", this is a finding. |
Fix Text (F-62514r933655_fix) |
---|
Navigate to and open: /etc/ssh/sshd_config Ensure the "SyslogFacility" line is uncommented and set to the following: SyslogFacility AUTHPRIV At the command line, run the following command: # systemctl restart sshd.service |