Check: NET1288
Network - Firewall:
NET1288
(in versions v8 r25 through v8 r21)
Title
Network device logs must be timestamped. (Cat III impact)
Discussion
Device logs can be used for forensic analysis in support of incident as well as to aid with normal traffic analysis. It can take numerous days to recover from a firewall outage when a proper backup scheme is not used.
Check Content
Review the device configuration to validate timestamps are configured for logging. If timestamps are not configured for logging purposes, this is a finding.
Fix Text
Configure the network device to include timestamps on all device logs.
Additional Identifiers
Rule ID:
Vulnerability ID: V-25890
Group Title:
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
No controls are assigned to this check |