RHEL 10 must monitor all remote access methods.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-280990 | RHEL-10-200647 | SV-280990r1165325_rule | CCI-000067 | medium |
| Description | ||||
| Logging remote access methods can be used to trace the decrease in the risks associated with remote user access management. It can also be used to spot cyberattacks and ensure ongoing compliance with organizational policies surrounding the use of remote access methods. | ||||
| STIG | Date | |||
| Red Hat Enterprise Linux 10 Security Technical Implementation Guide | 2026-03-11 | |||
Details
Check Text (C-280990r1165325_chk)
Verify RHEL 10 monitors all remote access methods with the following command:
$ sudo grep -rE '(auth.\*|authpriv.\*|daemon.\*)' /etc/rsyslog.conf /etc/rsyslog.d/
/etc/rsyslog.conf:authpriv.* /var/log/secure
If "auth.*", "authpriv.*", or "daemon.*" are not configured to be logged, this is a finding.
Fix Text (F-85456r1165324_fix)
Configure RHEL 10 to monitor all remote access methods.
Add or update the following lines to the "/etc/rsyslog.conf" file or a file in "/etc/rsyslog.d":
auth.*;authpriv.*;daemon.* /var/log/secure
Restart the "rsyslog" service with the following command for the changes to take effect:
$ sudo systemctl restart rsyslog.service