Vulnerability Discussion
Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Off-loading is a common process in information systems with limited audit storage capacity.
Check
Verify AlmaLinux OS 9 authenticates the remote logging server for offloading audit logs with the following command:
$ grep -i '$ActionSendStreamDriverAuthMode' /etc/rsyslog.conf /etc/rsyslog.d/*.conf
/etc/rsyslog.d/stig.conf:$ActionSendStreamDriverAuthMode x509/name
If the value of the "$ActionSendStreamDriverAuthMode" option is not set to "x509/name" or the line is commented out, ask the system administrator (SA) to indicate how the audit logs are offloaded to a different system or media.
If there is no evidence that the transfer of the audit logs being offloaded to another system or media is encrypted, this is a finding.
Fix
Configure AlmaLinux OS 9 to authenticate the remote logging server for offloading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf":
$ActionSendStreamDriverAuthMode x509/name