STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-280987

CAT II (Medium)

RHEL 10 must authenticate the remote logging server for off-loading audit logs via "rsyslog".

Rule ID

SV-280987r1195371_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001851

Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. RHEL 10 installation media provides "rsyslogd", a system utility providing support for message logging. Support for both internet and Unix domain sockets enables this utility to support both local and remote logging. Coupling this utility with "gnutls" (a secure communications library implementing the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram TLS (DTLS) protocols) creates a method to securely encrypt and off-load auditing. The "rsyslog" supported authentication modes include: - anon - Anonymous authentication. - x509/fingerprint - Certificate fingerprint authentication. - x509/certvalid - Certificate validation only. - x509/name - Certificate validation and subject name authentication. Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

Check Content

Verify RHEL 10 authenticates the remote logging server for off-loading audit logs with the following command:

$ sudo grep -r -E 'streamdriver.authmode|streamdriver.permittedpeer|tls.authmode|tls.permittedpeer' /etc/rsyslog.conf /etc/rsyslog.d/
/etc/rsyslog.d/99-forwarding.conf:        streamdriver.authmode="x509/name"

If the variable name "streamdriver.authmode" is present in an omfwd statement block, this is not a finding. However, if the "streamdriver.authmode" variable is in a module block, this is a finding.

If the value of the "$ActionSendStreamDriverAuthMode" or "streamdriver.authmode" or "tls.authmode" option is not set to "x509/name", or the line is commented out, ask the system administrator to indicate how the audit logs are off-loaded to a different system or media.

Additionally, if the permittedpeer is not specified in either of the following formats, this is a finding:
streamdriver.permittedpeer="rsyslog.server.example.com"
tls.permittedpeer="rsyslog.server.example.com"

If there is no evidence that the transfer of the audit logs being off-loaded to another system or media is encrypted, this is a finding.

Fix Text

Configure RHEL 10 to authenticate the remote logging server for off-loading audit logs by setting the following options in "/etc/rsyslog.d/99-forwarding.conf":

streamdriver.authmode="x509/name"

Specify the logserver to prevent man-in-the-middle attacks in the following format:
streamdriver.permittedpeer="rsyslog.server.example.com"