STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215312

CAT II (Medium)

AIX must implement a remote syslog server that is documented using site-defined procedures.

Rule ID

SV-215312r991589_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366CCI-001851

Discussion

If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unauthorized users without the administrator’s knowledge. Satisfies: SRG-OS-000480-GPOS-00227, SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

Check Content

Examine the "syslog.conf" file for any references to remote log hosts using command: 

# grep -v "^#" /etc/syslog.conf | grep '@' 
@<loghost>

Ask ISSO/SA for a list of valid remote syslog servers justified and documented using site-defined procedures.

Destination locations beginning with "@" represent log hosts. If the log host name is a local alias, such as log host, consult the "/etc/hosts" or other name databases as necessary to obtain the canonical name or address for the log host. Determine if the host referenced is a syslog host documented using site-defined procedures. 

If a loghost is not defined, not documented, or is commented out this is a finding.

Fix Text

Edit the /etc/syslog.conf file to include a documented and approved remote log host.