Check: CASA-ND-000090
Cisco ASA NDM STIG:
CASA-ND-000090
(in versions v1 r6 through v1 r0.1)
Title
The Cisco ASA must be configured to automatically audit account creation. (Cat II impact)
Discussion
Upon gaining access to a network device, an attacker will often first attempt to create a persistent method of reestablishing access. One way to accomplish this is to create a new account. Notification of account creation helps to mitigate this risk. Auditing account creation provides the necessary reconciliation that account management procedures are being followed. Without this audit trail, personnel without the proper authorization may gain access to critical network nodes.
Check Content
Review the ASA configuration to determine if it automatically audits account creation. The configuration should look similar to the example below: logging enable logging buffered informational Note: The ASA will log all EXEC-mode commands. If account creation is not automatically audited, this is a finding.
Fix Text
Configure the ASA to log account creation using the following commands: ASA(config)# logging enable ASA(config)# logging buffered informational ASA(config)# end
Additional Identifiers
Rule ID: SV-239897r879525_rule
Vulnerability ID: V-239897
Group Title: SRG-APP-000026-NDM-000208
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000018 |
The information system automatically audits account creation actions. |
Controls
Number | Title |
---|---|
AC-2 (4) |
Automated Audit Actions |