7.2.2 Ensure syslog is configured to send logs to a remote log host

Information

This recommendation implements a remote syslog configuration.

To further enhance the local syslog logging process CIS recommends that syslog information, in particular that generated by the auth facility, is logged remotely. This recommendation assumes that a remote and secure syslog server is available on the network. If this is not the case, please skip to the next recommendation.

The primary reason for logging remotely is to provide an un-editable audit trail of system access. If a hacker were to access a system and gain super user authority it would be easy to edit local files and remove all traces of access, providing the system administrator with no way of identifying the individual or group responsible. If the log data is sent remotely at the point of access, these remote logs can then be reconciled with local data to identify tampered and altered files. The logs can also be used as evidence in any subsequent prosecution.

Solution

Explicitly define a remote host for auth.info data in /etc/syslog.conf (enter the remote host IP address in the example below):

printf "auth.infott@<IP address of remote syslog server>" >> /etc/syslog.conf

Note: This ensures that remote login, sudo or su attempts are logged separately

Create a remote host entry in /etc/syslog.conf to capture all other output of level info or higher (enter the remote host IP address in the example below):

printf "*.info;auth.nonet@<IP address of remote syslog server>
" >> /etc/syslog.conf

Refresh syslogd to force the daemon to read the edited /etc/syslog.conf :

refresh -s syslogd

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(2)

Plugin: Unix

Control ID: 09d2c3fd6c178f5bcfd287b8f480947e6b3c0c178cdc224b38a449d7a5bace03