|Finding ID||Version||Rule ID||IA Controls||Severity|
|It is critical that when the IDPS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failures in the audit capturing mechanisms; and audit storage capacity being reached or exceeded. Responses to audit failure depend upon the nature of the failure. The IDPS performs a critical security function, so its continued operation is imperative. Since availability of the IDPS is an overriding concern, shutting down the system in the event of an audit failure should be avoided, except as a last resort. The SYSLOG protocol does not support automated synchronization, however this functionality may be provided by Network Management Systems (NMSs) which are not within the scope of this SRG.|
|Cisco ASA IPS Security Technical Implementation Guide||2021-03-15|
|Check Text ( C-43114r665954_chk )|
| Verify that TCP is being used to send log data to the syslog server. |
Step 1: Navigate to Devices >> Platform Settings >> Syslog Servers.
Step 2: Verify that TCP is listed under the Protocol tab has been selected.
If the Cisco ASA is not configured to use TCP to send log data to the syslog server, this is a finding.
|Fix Text (F-43073r665955_fix)|
| Step 1: Navigate to Devices >> Platform Settings >> Syslog Servers. |
Step 2: Click on the pencil icon to edit the applicable server.
Step 3: Select the TCP option.
Step 4: Click OK and Save.