Check: AZLX-23-001045
Amazon Linux 2023 STIG:
AZLX-23-001045
(in version v1 r1)
Title
Amazon Linux 2023 must monitor remote access methods. (Cat II impact)
Discussion
Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access management difficult at best.
Check Content
Verify Amazon Linux 2023 monitors all remote access methods. Check that remote access methods are being logged by running the following command: $ sudo grep -E '(auth.*|authpriv.*|daemon.*)' /etc/rsyslog.conf auth.*;authpriv.*;daemon.* /var/log/secure If "auth.*", "authpriv.*", or "daemon.*" are not configured to be logged, this is a finding.
Fix Text
Configure Amazon Linux 2023 to monitor all remote access methods by installing rsyslog with the following command: $ sudo yum install rsyslog Then add or update the following lines to the "/etc/rsyslog.conf" file: auth.*;authpriv.*;daemon.* /var/log/secure The "rsyslog" service must be restarted for the changes to take effect. To restart the "rsyslog" service, run the following command: $ sudo systemctl restart rsyslog.service
Additional Identifiers
Rule ID: SV-274021r1120695_rule
Vulnerability ID: V-274021
Group Title: SRG-OS-000032-GPOS-00013
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000067 |
Employ automated mechanisms to monitor remote access methods. |
Controls
| Number | Title |
|---|---|
| AC-17(1) |
Monitoring and Control |