STIGQter STIGQter: STIG Summary: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Ubuntu operating system must monitor remote access methods.

DISA Rule

SV-219306r610963_rule

Vulnerability Number

V-219306

Group Title

SRG-OS-000032-GPOS-00013

Rule Version

UBTU-18-010410

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to monitor all remote access methods by adding the following lines to the "/etc/rsyslog.d/50-default.conf" file:

auth.*,authpriv.* /var/log/secure
daemon.notice /var/log/messages

In order for the changes to take effect the "rsyslog" service must be restarted with the following command:

# sudo systemctl restart rsyslog.service

Check Contents

Verify that the Ubuntu operating system monitors all remote access methods.

Check that remote access methods are being logged by running the following command:

# grep -E -r '^(auth,authpriv\.\*|daemon\.\*)' /etc/rsyslog.*
/etc/rsyslog.d/50-default.conf:auth,authpriv.* /var/log/auth.log
/etc/rsyslog.d/50-default.conf:daemon.notice /var/log/messages

If "auth.*", "authpriv.*" or "daemon.*" are not configured to be logged in at least one of the config files, this is a finding.

Vulnerability Number

V-219306

Documentable

False

Rule Version

UBTU-18-010410

Severity Override Guidance

Verify that the Ubuntu operating system monitors all remote access methods.

Check that remote access methods are being logged by running the following command:

# grep -E -r '^(auth,authpriv\.\*|daemon\.\*)' /etc/rsyslog.*
/etc/rsyslog.d/50-default.conf:auth,authpriv.* /var/log/auth.log
/etc/rsyslog.d/50-default.conf:daemon.notice /var/log/messages

If "auth.*", "authpriv.*" or "daemon.*" are not configured to be logged in at least one of the config files, this is a finding.

Check Content Reference

M

Target Key

4055

Comments