UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must protect the application log information from unauthorized modification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37359 SRG-NET-999999-FW-000189 SV-49120r1_rule Medium
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Event log data must be protected from unauthorized access, including from legitimate administrators who do not need this type of access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment is possible. Direct log modification is not recommended. If it becomes necessary for operational or mission essential reasons, the modification action must generate an audit log entry in compliance with CCI-000172.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45606r1_chk )
Verify a security policy for the firewall application log is in place which allows only system administrators with the proper authorization to modify the log.

If firewall implementation application logs are not protected from unauthorized modification, this is a finding.
Fix Text (F-42284r1_fix)
Create and implement an access control security policy to prevent unauthorized modification of the firewall application logs.