Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-74003 | CISR-ND-000036 | SV-88677r2_rule | Medium |
Description |
---|
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network device must support the organization's capability to correlate the audit log data from multiple network devices to acquire a clear understanding of events. In order to correlate auditable events, time stamps are needed on all of the log records. If the internal clock is not used, the system may not be able to provide time stamps for log messages. Additionally, externally generated time stamps may not be accurate. Applications can use the capability of an operating system or purpose-built module for this purpose. (Note that the internal clock is required to be synchronized with authoritative time sources by other requirements.) |
STIG | Date |
---|---|
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide | 2018-03-08 |
Check Text ( C-74087r3_chk ) |
---|
Verify that the Cisco IOS XE router is configured to use internal system clocks to generate time stamps for audit records. The configuration should look similar to the example below: service timestamps log datetime If internal systems clocks are not being used, this is a finding. |
Fix Text (F-80543r3_fix) |
---|
Configure the Cisco IOS XE router to use internal clocks to generate time stamps for audit records. The configuration should look similar to the example below: service timestamps log datetime |