UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ISSO must ensure the alarm message identifying the potential security violation makes accessible the audit record contents associated with the event(s).


Overview

Finding ID Version Rule ID IA Controls Severity
V-14653 NET0395 SV-15279r2_rule ECAR-1 ECAR-2 ECAR-3 ECSC-1 Low
Description
The relevant audit information must be available to administrators. The firewall shall immediately display an alarm message, identifying the potential security violation and make accessible the audit record contents associated with the event(s) that generated the alarm.
STIG Date
Firewall Security Technical Implementation Guide 2016-12-21

Details

Check Text ( C-12667r2_chk )
Review the firewall configuration to determine what alerts have been defined and how the notifications are performed. The relevant audit information must be available to administrators. The message will not be scrolled off the screen due to other activities taking place (e.g., the Audit Administrator is running an audit report).

If the device does not write violations to the console and make accessible the audit record contents, this is a finding.
Fix Text (F-14111r1_fix)
Configure the firewall to write violations to the console and make accessible the audit record contents.