AlmaLinux OS 9 must authenticate the remote logging server for offloading audit logs via rsyslog.

STIG ID: ALMA-09-052600  |  SRG: SRG-OS-000479-GPOS-00224 |  Severity: medium |  CCI: CCI-001851 |  Vulnerability Id: V-269513

Vulnerability Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Off-loading is a common process in information systems with limited audit storage capacity.

Check

Verify AlmaLinux OS 9 authenticates the remote logging server for offloading audit logs with the following command:

$ grep -i '$ActionSendStreamDriverAuthMode' /etc/rsyslog.conf /etc/rsyslog.d/*.conf

/etc/rsyslog.d/stig.conf:$ActionSendStreamDriverAuthMode x509/name

If the value of the "$ActionSendStreamDriverAuthMode" option is not set to "x509/name" or the line is commented out, ask the system administrator (SA) to indicate how the audit logs are offloaded to a different system or media.

If there is no evidence that the transfer of the audit logs being offloaded to another system or media is encrypted, this is a finding.

Fix

Configure AlmaLinux OS 9 to authenticate the remote logging server for offloading audit logs by setting the following option in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf":

$ActionSendStreamDriverAuthMode x509/name