The Cisco switch must be configured to generate log records when administrator privileges are modified.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Audit records can be generated from various components within the network device (e.g., module or policy filter).
Step 1: Verify that account records will be sent to an AAA server as shown in the example below:
aaa accounting default group RADIUS_SERVERS
Step 2: Verify that the referenced group name has defined AAA servers that are online.
aaa group server radius RADIUS_SERVERS server 10.1.48.10 server 10.1.48.12
Note: Cisco NX-OS devices report configuration activity to TACACS+ or RADIUS servers in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the AAA server.
If the Cisco switch is not configured to generate log records when administrator privileges are modified, this is a finding.
Fix Text (F-22210r539240_fix)
Configure the Cisco switch to generate log records when account privileges are modified as shown in the example below:
Step 1: Configure the AAA servers as shown in the example below: