UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element logging function must be configured to reduce the likelihood of audit log record capacity being exceeded.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000083-FW-NA SRG-NET-000083-FW-NA SRG-NET-000083-FW-NA_rule Low
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured network element. The network element must be configured to allocate enough log record storage capacity that will not become exhausted. Without this capability, the site could lose valuable data needed for investigating security incidents. The central audit server configuration must include an allocation of space sufficient for the firewall audit trail log. This configuration is not performed on the firewall, thus this requirement is not applicable.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000083-FW-NA_chk )
This requirement is NA for firewall. No fix required.
Fix Text (F-SRG-NET-000083-FW-NA_fix)
This requirement is NA for firewall. No fix required.