UCF STIG Viewer Logo

The Cisco IOS XE router must produce audit records that contain information to establish the outcome of the event.


Overview

Finding ID Version Rule ID IA Controls Severity
V-73997 CISR-ND-000031 SV-88671r2_rule Low
Description
Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the system. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the device after the event occurred). As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response.
STIG Date
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide 2018-12-20

Details

Check Text ( C-74079r3_chk )
Verify that logging is properly configured on the Cisco IOS XE router.

The configuration will look similar to the example below:

logging userinfo

login on-failure log
login on-success log

archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys

If logging is not configured to log the outcome of events, this is a finding.
Fix Text (F-80537r3_fix)
Enter the following commands to enable auditing.

The configuration will look similar to the example below:

logging userinfo

login on-failure log
login on-success log

archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys