Vulnerability Discussion
Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Offloading is a common process in information systems with limited audit storage capacity.
OL 8 installation media provides "rsyslogd". This is a system utility providing support for message logging. Support for both internet and UNIX domain sockets enables this utility to support both local and remote logging. Coupling this utility with "gnutls" (which is a secure communications library implementing the SSL, TLS, and DTLS protocols) provides a method to securely encrypt and offload auditing.
Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224
Check
Verify the operating system encrypts audit records offloaded onto a different system or media from the system being audited with the following commands:
$ sudo grep -i '$DefaultNetstreamDriver' /etc/rsyslog.conf /etc/rsyslog.d/*.conf
/etc/rsyslog.conf:$DefaultNetstreamDriver gtls
If the value of the "$DefaultNetstreamDriver" option is not set to "gtls" or the line is commented out, this is a finding.
$ sudo grep -i '$ActionSendStreamDriverMode' /etc/rsyslog.conf /etc/rsyslog.d/*.conf
/etc/rsyslog.conf:$ActionSendStreamDriverMode 1
If the value of the "$ActionSendStreamDriverMode" option is not set to "1" or the line is commented out, this is a finding.
If neither of the definitions above are set, ask the System Administrator to indicate how the audit logs are offloaded to a different system or media.
If there is no evidence that the transfer of the audit logs being offloaded to another system or media is encrypted, this is a finding.
Fix
Configure the operating system to encrypt offloaded audit records by setting the following options in "/etc/rsyslog.conf" or "/etc/rsyslog.d/[customfile].conf":
$DefaultNetstreamDriver gtls
$ActionSendStreamDriverMode 1