Details
Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities.
The INFO LogLevel is required, at least, to ensure the capturing of failed login events.
Solution
Open /etc/ssh/sshd_config with a text editor.
Ensure that the ‘LogLevel’ line is uncommented and set to the following:
LogLevel INFO
At the command line, execute the following command:
# service sshd reload
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.
References
- 800-53|AC-17(1)
- CAT|II
- CCI|CCI-000067
- Rule-ID|SV-239080r675048_rule
- STIG-ID|PHTN-67-000008
- Vuln-ID|V-239080