RHEL-09-652040 - RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.

Information

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Offloading is a common process in information systems with limited audit storage capacity.

RHEL 9 installation media provides 'rsyslogd', a system utility providing support for message logging. Support for both internet and Unix domain sockets enables this utility to support both local and remote logging. Coupling this utility with 'gnutls' (a secure communications library implementing the SSL, TLS and DTLS protocols) creates a method to securely encrypt and offload auditing.

'Rsyslog' supported authentication modes include:
anon - anonymous authentication
x509/fingerprint - certificate fingerprint authentication
x509/certvalid - certificate validation only
x509/name - certificate validation and subject name authentication

Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

Solution

Configure RHEL 9 to authenticate the remote logging server for offloading audit logs by setting the following option in '/etc/rsyslog.conf' or '/etc/rsyslog.d/[customfile].conf':

$ActionSendStreamDriverAuthMode x509/name

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/U_RHEL_9_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001851, Rule-ID|SV-258146r926425_rule, STIG-ID|RHEL-09-652040, Vuln-ID|V-258146

Plugin: Unix

Control ID: c094f4a31a56746209bb745963581c04c351b159df429e3b2c0cf485f08f8cec