Check: CISC-ND-001270
Cisco IOS Router NDM STIG:
CISC-ND-001270
(in versions v2 r8 through v1 r0.1)
Title
The Cisco router must be configured to generate log records for privileged activities. (Cat II impact)
Discussion
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
Check Content
Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example configurations below. archive log config logging enable If the Cisco router is not configured to generate log records for privileged activities, this is a finding.
Fix Text
Configure the Cisco router to generate log records for privileged activities as shown in the example below. R4(config)#archive R4(config-archive)#log config R4(config-archive-log-cfg)#logging enable R4(config-archive-log-cfg)#end
Additional Identifiers
Rule ID: SV-215705r879875_rule
Vulnerability ID: V-215705
Group Title: SRG-APP-000504-NDM-000321
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000172 |
The information system generates audit records for the events defined in AU-2 d. with the content defined in AU-3. |
Controls
Number | Title |
---|---|
AU-12 |
Audit Generation |