Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-68039 | AADC-NM-000029 | SV-82529r1_rule | Low |
Description |
---|
In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event. The source may be a component, module, or process within the device or an external session, administrator, or device. Associating information about where the source of the event occurred provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured device. When the event log or system log is written to a syslog server, the hostname is included with each record. |
STIG | Date |
---|---|
A10 Networks ADC NDM Security Technical Implementation Guide | 2016-04-15 |
Check Text ( C-68599r1_chk ) |
---|
Observe someone logging onto the device. The prompt will appear after a successful logon. If the prompt is not a unique hostname assigned by the organization, this is a finding. Note: The device automatically includes the hostname in each Syslog message. |
Fix Text (F-74155r1_fix) |
---|
The following command will change the hostname: hostname [string] The string can contain 1 to 31 characters and can contain the following characters: a-z A-Z 0-9 - . ( ) Note: The device automatically includes the hostname in each Syslog message. |