
This patch adds docs to explain that CentOS/RHEL/Ubuntu already log in a way that meets the STIG's requirements. Deployers should not need to adjust these configurations unless their environment requires it. Implements: blueprint security-rhel7-stig Change-Id: Ibac4a1de917a67cb21494466bcabb746d3aaf540
323 B
323 B
---id: RHEL-07-040020 status: exception - manual intervention tag: misc ---
Deployers should review their logging configuration to ensure it
meets the requirements of the STIG. All operating systems supported by
the role already log the auth
, authpriv
, and
daemon
facilities at the correct levels by default.