Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-37111 | SRG-NET-000114-FW-000066 | SV-48872r1_rule | Low |
Description |
---|
Logging the actions of specific events provides a way to investigate an attack, recognize resource utilization or capacity thresholds, or to identify an improperly configured network element. If administrators do not have granular control of the rule to be applied and logged for later analysis, then malicious attacks may be missed. Configuration of the audit log, particularly the audit events captured must be restricted to access by designated individuals only. |
STIG | Date |
---|---|
Firewall Security Requirements Guide | 2013-04-24 |
Check Text ( C-45483r1_chk ) |
---|
Obtain a list of organizationally defined events which should be logged. Verify this list of events is configured for logging by viewing the firewall event alert functionality. If the firewall implementation does not allow administrators to select which auditable events are logged, this is a finding. |
Fix Text (F-42056r1_fix) |
---|
Configure the firewall implementation settings to allow authorized personnel to select which auditable events are audited. |