Amazon Linux 2023 must authenticate the remote logging server for off-loading audit logs via rsyslog.

STIG ID: AZLX-23-002065  |  SRG: SRG-OS-000479-GPOS-00224 |  Severity: medium (CAT II)  |  CCI: CCI-001851 |  Vulnerability Id: V-274077

Vulnerability Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Check

Verify Amazon Linux 2023 authenticates the remote logging server for off-loading audit logs with the following command:

$ sudo grep -i '$ActionSendStreamDriverAuthMode' /etc/rsyslog.conf /etc/rsyslog.d/*.conf
/etc/rsyslog.conf:$ActionSendStreamDriverAuthMode x509/name

If the value of the "$ActionSendStreamDriverAuthMode" option is not set to "x509/name" or the line is commented out, ask the system administrator (SA) to indicate how the audit logs are off-loaded to a different system or media.

If there is no evidence that the transfer of the audit logs being off-loaded to another system or media is encrypted, this is a finding.

Fix

Configure Amazon Linux 2023 to authenticate the remote logging server for off-loading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf":

$ActionSendStreamDriverAuthMode x509/name