UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The FA will have a procedure in place to dump logs when they reach 75% capacity to a syslog server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14647 NET0388 SV-15273r1_rule ECSC-1 Low
Description
Having a procedure tested and verified will prevent the logs from filling when they reach 75% capacity.
STIG Date
Firewall Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-13715r1_chk )
Have the FA identify how the firewall logs are managed during critical events.
Fix Text (F-14749r1_fix)
Have the FA establish procedures for dumping the logs.