Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-73985 | CISR-ND-000025 | SV-88659r2_rule | Medium |
Description |
---|
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter). |
STIG | Date |
---|---|
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide | 2018-03-08 |
Check Text ( C-74067r3_chk ) |
---|
Verify that the Cisco IOS XE router is configured to generate audit records when successful/unsuccessful attempts to access privileges. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If audit records are not being generated, this is a finding. |
Fix Text (F-80525r3_fix) |
---|
Configure the Cisco IOS XE router to enable auditing. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys |