BIND-9X-001040 - The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog.

Information

Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a different system or onto separate media than the system being audited on a defined frequency helps to assure, in the event of a catastrophic system failure, the audit records will be retained.
This helps to ensure a compromise of the information system being audited does not also result in a compromise of the audit records.

Solution

Configure the 'logging' statement to send audit logs to the syslog daemon.
logging {
channel <syslog_channel> {
syslog <syslog_facility>;
};
category <category_name> { <syslog_channel>; };
};
Note: It is recommended to use a local syslog facility (i.e. local0 -7) when configuring the syslog channel.
Restart the BIND 9.x process.
Configure the (r)syslog daemon to send audit logs to a remote server.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V2R3_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(2), CAT|III, CCI|CCI-001348, Rule-ID|SV-207546r879582_rule, STIG-ID|BIND-9X-001040, STIG-Legacy|SV-87015, STIG-Legacy|V-72391, Vuln-ID|V-207546

Plugin: Unix

Control ID: 4c1abcfa94d8257cafd2bfe636aa594c8cb34f7a835e142919b55bcc0e49eccb