UCF STIG Viewer Logo

The firewall implementation must use internal system clocks to generate timestamps for audit records.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000096-FW-000062 SRG-NET-000096-FW-000062 SRG-NET-000096-FW-000062_rule Low
Description
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the firewall implementation must support the organization's capability to correlate the audit log data from multiple firewalls to acquire a clear understanding of events. In order to correlate auditable events, timestamps are needed on all of the log records.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000096-FW-000062_chk )
Verify the firewall is configured to use the internal system clock to generate the timestamp included with the audit log entry.

If the firewall is not configured to use the internal system clock to generate timestamps for audit records, this is a finding.
Fix Text (F-SRG-NET-000096-FW-000062_fix)
Configure the firewall implementation to use the internal system clock to generate the timestamp included with audit log entries.