STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must monitor remote access methods.

DISA Rule

SV-238324r654147_rule

Vulnerability Number

V-238324

Group Title

SRG-OS-000032-GPOS-00013

Rule Version

UBTU-20-010403

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to monitor all remote access methods by adding the following lines to the "/etc/rsyslog.d/50-default.conf" file:

auth.*,authpriv.* /var/log/secure
daemon.notice /var/log/messages

For the changes to take effect, restart the "rsyslog" service with the following command:

$ sudo systemctl restart rsyslog.service

Check Contents

Verify that the Ubuntu operating system monitors all remote access methods.

Check that remote access methods are being logged by running the following command:

$ grep -E -r '^(auth,authpriv\.\*|daemon\.\*)' /etc/rsyslog.*
/etc/rsyslog.d/50-default.conf:auth,authpriv.* /var/log/auth.log
/etc/rsyslog.d/50-default.conf:daemon.notice /var/log/messages

If "auth.*", "authpriv.*", or "daemon.*" are not configured to be logged in at least one of the config files, this is a finding.

Vulnerability Number

V-238324

Documentable

False

Rule Version

UBTU-20-010403

Severity Override Guidance

Verify that the Ubuntu operating system monitors all remote access methods.

Check that remote access methods are being logged by running the following command:

$ grep -E -r '^(auth,authpriv\.\*|daemon\.\*)' /etc/rsyslog.*
/etc/rsyslog.d/50-default.conf:auth,authpriv.* /var/log/auth.log
/etc/rsyslog.d/50-default.conf:daemon.notice /var/log/messages

If "auth.*", "authpriv.*", or "daemon.*" are not configured to be logged in at least one of the config files, this is a finding.

Check Content Reference

M

Target Key

5318

Comments