Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-71571 | CAGW-DM-000360 | SV-86195r1_rule | Medium |
Description |
---|
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis. |
STIG | Date |
---|---|
CA API Gateway NDM Security Technical Implementation Guide | 2016-09-20 |
Check Text ( C-71949r1_chk ) |
---|
Examine "/etc/audit/audit.rules" to confirm any custom developed rules are contained within the file. If the "/etc/audit/audit.rules" does not contain the custom developed rules within the file, this is a finding. |
Fix Text (F-77895r1_fix) |
---|
The Gateway relies on the standard Linux audit subsystem. The subsystem is configurable by modifying /etc/audit/audit.rules. Custom rules can be added to this file. See the Linux man-page for audit.rules(7) for detail about specifying custom rules. |