UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The BIG-IP appliance must be configured to allow designated individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time.


Overview

Finding ID Version Rule ID IA Controls Severity
V-60199 F5BI-DM-000189 SV-74629r1_rule Medium
Description
If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost. This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near-real-time, within minutes, or within hours. The individuals or roles to change the auditing are dependent on the security configuration of the network device--for example, it may be configured to allow only some administrators to change the auditing, while other administrators can review audit logs but not reconfigure auditing. Because this capability is so powerful, organizations should be extremely cautious about only granting this capability to fully authorized security personnel.
STIG Date
F5 BIG-IP Device Management 11.x Security Technical Implementation Guide 2019-10-01

Details

Check Text ( C-61053r1_chk )
Verify the BIG-IP appliance is configured to only allow organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time.

Navigate to the BIG-IP System manager >> System >> Users >> Authentication.

Verify that "User Directory" is set to an approved authentication server that assigns authenticated users to an appropriate group.

Navigate to System >> Users >> Remote Role Groups.

Verify Remote Role Groups are assigned proper Role Access and Partition Access.

If the BIG-IP appliance is not configured to provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix Text (F-65787r1_fix)
Configure the BIG-IP appliance to use a properly configured authentication server to provide the capability for organization-identified individuals or roles be assigned to change the auditing to be performed based on all selectable event criteria within near-real-time.