Logging of remote access methods must be implemented to help identify cyber
attacks and ensure ongoing compliance with remote access policies are being
audited and upheld. An examples of a remote access method is the use of the
Remote Desktop Protocol (RDP) from an external, non-organization controlled
network. The /etc/rsyslog.conf
or
/etc/rsyslog.d/*.conf
file should contain a match for the following
selectors: auth.*
, authpriv.*
, and daemon.*
. If
not, use the following as an example configuration:
auth.*;authpriv.*;daemon.* /var/log/secure