1. Home
  2. Security Hardening
  3. DISA Bind 9.x STIG V2R2
  4. BIND-9X-001040 – The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog – named syslog

BIND-9X-001040 – The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog – named syslog

Details

Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a different system or onto separate media than the system being audited on a defined frequency helps to assure, in the event of a catastrophic system failure, the audit records will be retained.

This helps to ensure a compromise of the information system being audited does not also result in a compromise of the audit records.

Solution

Configure the ‘logging’ statement to send audit logs to the syslog daemon.

logging {
channel {
syslog ;
};
category { ; };
};

Note: It is recommended to use a local syslog facility (i.e. local0 -7) when configuring the syslog channel.

Restart the BIND 9.x process.

Configure the (r)syslog daemon to send audit logs to a remote server.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles