Check: CASA-IP-000110
Cisco ASA IPS STIG:
CASA-IP-000110
(in versions v1 r1 through v1 r0.1)
Title
The Cisco ASA must be configured to off-load log records to a centralized log server. (Cat II impact)
Discussion
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is compromised. This also prevents the log records from being lost if the logs stored locally are accidentally or intentionally deleted, altered, or corrupted.
Check Content
Verify that a syslog server has been defined. Step 1: Navigate to Configuration >> ASA Firepower Configuration >> Policies > Actions Alerts. The Alerts page appears. Step 2: Verify the IP address and port number of the syslog server. If the Cisco ASA is not configured to send log records to a centralized log server, this is a finding.
Fix Text
Configure Firepower to send log records to a syslog server as shown in the following steps: Step 1: Navigate to Configuration >> ASA Firepower Configuration >> Policies >> Actions Alerts. Step 2: Click the Create Alert drop-down menu and choose option Create Syslog Alert. Step 3: Enter the following values for the Syslog server: Host: Specify the IP address/hostname of Syslog server. Port: Specify the port number of Syslog server. Step 4: Click Store ASA FirePOWER Changes.
Additional Identifiers
Rule ID: SV-239879r665950_rule
Vulnerability ID: V-239879
Group Title: SRG-NET-000334-IDPS-00191
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001851 |
The information system off-loads audit records per organization-defined frequency onto a different system or media than the system being audited. |
Controls
Number | Title |
---|---|
AU-4 (1) |
Transfer To Alternate Storage |