The Cisco switch must be configured to generate log records when administrator privileges are deleted.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Audit records can be generated from various components within the network device (e.g., module or policy filter).
Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:
Step 1: Verify that account records will be sent to an AAA server as shown in the example below:
aaa accounting default group RADIUS_SERVERS
Step 2: Verify that the referenced group name has defined AAA servers that are online.
aaa group server radius RADIUS_SERVERS server 10.1.48.10 server 10.1.48.12
Note: Cisco NX-OS devices report configuration activity to TACACS+ or RADIUS servers in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the AAA server.
If the Cisco switch is not configured to generate log records when administrator privileges are deleted, this is a finding.
Fix Text (F-22211r539243_fix)
Configure the Cisco switch to generate log records when administrator privileges are deleted as shown in the example below:
Step 1: Configure the AAA servers as shown in the example below: