STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-12004

CAT II (Medium)

The system must log informational authentication data.

Rule ID

SV-45755r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000126

Discussion

Monitoring and recording successful and unsuccessful logins assists in tracking unauthorized access to the system.

Check Content

Check /etc/rsyslog.conf and verify the auth facility is logging both the notice and info level messages by:

# grep “auth.notice” /etc/rsyslog.conf
# grep “auth.info” /etc/rsyslog.conf
or
# grep 'auth.*' /etc/rsyslog.conf

If auth.* is not found, and either auth.notice or auth.info is not found, this is a finding.

Fix Text

Edit /etc/rsyslog.conf and add local log destinations for auth.* or both auth.notice and auth.info.