Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-999999-FW-000200 | SRG-NET-999999-FW-000200 | SRG-NET-999999-FW-000200_rule | Medium |
Description |
---|
Event logging is a key component of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Event log data must be protected from unauthorized access, including from legitimate administrators who do not need this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment is possible. |
STIG | Date |
---|---|
Firewall Security Requirements Guide | 2012-12-10 |
Check Text ( C-SRG-NET-999999-FW-000200_chk ) |
---|
Verify a security policy for the firewall application log is in place which allows only system administrators with the proper authorization to read the application log on the management console. If firewall implementation application logs are not protected from unauthorized read access, this is a finding. |
Fix Text (F-SRG-NET-999999-FW-000200_fix) |
---|
Create and implement an access control security policy to prevent unauthorized read access of the firewall implementation application logs. |