UCF STIG Viewer Logo

The firewall implementation must protect audit log information from unauthorized modification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37105 SRG-NET-000099-FW-000060 SV-48866r1_rule Low
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Audit and event log data must be protected from unauthorized access, including from legitimate administrators who do not have a need for this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment could result.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45477r1_chk )
Verify a security policy for the audit logs is in place which allows only system administrators with the proper authorization to modify the firewall audit log.

If audit logs are not protected from unauthorized modification, this is a finding.
Fix Text (F-42050r1_fix)
Create and implement an access control security policy to prevent unauthorized modification of the audit logs on the firewall.