Check: F5BI-LT-000055
F5 BIG-IP Local Traffic Manager STIG:
F5BI-LT-000055
(in versions v2 r3 through v1 r2)
Title
The BIG-IP Core implementation must be configured to protect audit information from unauthorized read access. (Cat II impact)
Discussion
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. Thus, it is imperative that the collected log data from the various network elements, as well as the auditing tools, be secured and can only be accessed by authorized personnel.
Check Content
Verify the BIG-IP Core is configured to protect audit information from unauthorized read access. Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options. Under 'Log Access', verify unauthorized roles are set to 'Deny'. If the BIG-IP Core is not configured to protect audit information from unauthorized read access, this is a finding.
Fix Text
Configure the BIG-IP Core to protect audit information from unauthorized read access.
Additional Identifiers
Rule ID: SV-215749r557356_rule
Vulnerability ID: V-215749
Group Title: SRG-NET-000098-ALG-000056
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000162 |
The information system protects audit information from unauthorized access. |
Controls
Number | Title |
---|---|
AU-9 |
Protection Of Audit Information |