Check: CISC-ND-001310
Cisco IOS XE Switch NDM STIG:
CISC-ND-001310
(in versions v2 r2 through v1 r0.1)
Title
The Cisco switch must be configured to off-load log records onto a different system than the system being audited. (Cat II impact)
Discussion
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
Check Content
Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below: logging trap notifications logging x.x.x.x Note: Default for sending log messages to the syslog server is informational (level 6); hence, the command logging trap informational will not be seen in the configuration. Level of log messages sent to the syslog server can be verified using the show logging command. If the Cisco switch is not configured to off-load log records onto a different system than the system being audited, this is a finding.
Fix Text
Configure the Cisco switch to send log records to a syslog server as shown in the example below: SW4(config)#logging host x.x.x.x SW4(config)#logging trap notifications
Additional Identifiers
Rule ID: SV-220564r508638_rule
Vulnerability ID: V-220564
Group Title: SRG-APP-000515-NDM-000325
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001851 |
The information system off-loads audit records per organization-defined frequency onto a different system or media than the system being audited. |
Controls
Number | Title |
---|---|
AU-4 (1) |
Transfer To Alternate Storage |