UBTU-18-010022 - The Ubuntu operating system must be configured to preserve log records from failure events.

Information

Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system.

Preserving operating system state information helps to facilitate operating system restart and return to the operational mode of the organization with least disruption to mission/business processes.

Solution

Configure the log service to collect failure events.

Install the log service (if the log service is not already installed) with the following command:

# sudo apt-get install rsyslog

Enable the log service with the following command:

# sudo systemctl enable rsyslog

Restart the log service with the following command:

# sudo systemctl restart rsyslog

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_18-04_LTS_V2R15_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-24, CAT|II, CCI|CCI-001665, Rule-ID|SV-219160r991562_rule, STIG-ID|UBTU-18-010022, STIG-Legacy|SV-109651, STIG-Legacy|V-100547, Vuln-ID|V-219160

Plugin: Unix

Control ID: 710af054eb2978cca6d130555313d43713def0f30dc71159940db68f9e99a7af