1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 STS Tomcat V1R1
  4. VCST-67-000027 – Rsyslog must be configured to monitor and ship Security Token Service log files – sts-runtime

VCST-67-000027 – Rsyslog must be configured to monitor and ship Security Token Service log files – sts-runtime

Details

The Security Token Service produces a number of logs that must be offloaded from the originating system. This information can then be used for diagnostic, forensics, or other purposes relevant to ensuring the availability and integrity of the hosted application.

Satisfies: SRG-APP-000358-WSR-000163, SRG-APP-000125-WSR-000071

Solution

Navigate to and open /etc/vmware-syslog/stig-services-sso.conf.

Create the file if it does not exist.

Set the contents of the file as follows:

input(type=’imfile’
File=’/var/log/vmware/sso/*.log’
Tag=’vmidentity’
PersistStateInterval=’200′
Severity=’info’
Facility=’local0′)
input(type=’imfile’
File=’/var/log/vmware/sso/sts-runtime.log.*’
Tag=’sts-runtime’
PersistStateInterval=’200′
Severity=’info’
Facility=’local0′)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles