UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must capture and log organizationally defined additional information (identified by type, location, or subject) to the audit records for audit events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37097 SRG-NET-000080-FW-000052 SV-48858r1_rule Low
Description
Audit record content that may be necessary to satisfy this requirement includes timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control ACLs or policy filters invoked. This capability is critical for accurate forensic analysis.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45469r1_chk )
If the organization does not require organizationally defined additional information to be captured in the audit log from the firewall, this is not a finding.
Examine the audit log configuration on the firewall or view several alert records on the organization's central audit log server.
Verify the entries sent to the audit log include organizationally defined additional information.

If the audit log event records do not include organizationally defined additional information, this is a finding.
Fix Text (F-42042r1_fix)
Configure the firewall implementation, to ensure entries sent to the audit log include organizationally defined additional information. Organizational requirements for what audit events are required may be defined by type, location, or subject.