RHEL 10 must monitor all remote access methods.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-280990RHEL-10-200647SV-280990r1165325_ruleCCI-000067medium
Description
Logging remote access methods can be used to trace the decrease in the risks associated with remote user access management. It can also be used to spot cyberattacks and ensure ongoing compliance with organizational policies surrounding the use of remote access methods.
STIGDate
Red Hat Enterprise Linux 10 Security Technical Implementation Guide2026-03-11

Details

Check Text (C-280990r1165325_chk)

Verify RHEL 10 monitors all remote access methods with the following command: $ sudo grep -rE '(auth.\*|authpriv.\*|daemon.\*)' /etc/rsyslog.conf /etc/rsyslog.d/ /etc/rsyslog.conf:authpriv.* /var/log/secure If "auth.*", "authpriv.*", or "daemon.*" are not configured to be logged, this is a finding.

Fix Text (F-85456r1165324_fix)

Configure RHEL 10 to monitor all remote access methods. Add or update the following lines to the "/etc/rsyslog.conf" file or a file in "/etc/rsyslog.d": auth.*;authpriv.*;daemon.* /var/log/secure Restart the "rsyslog" service with the following command for the changes to take effect: $ sudo systemctl restart rsyslog.service