UCF STIG Viewer Logo

The firewall implementation must protect application logs from unauthorized deletion.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37360 SRG-NET-999999-FW-000190 SV-49121r1_rule Medium
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Firewall application log data must be protected from unauthorized access, including from legitimate administrators who do not need for this type of access. Unauthorized deletion of logs or events may obfuscate evidence of an attack. Event log and firewall log entries should not be deleted without a clear incident trail and an approval process.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45607r1_chk )
Verify a security policy for the firewall application logs is in place which allows only system administrators with the proper authorization to delete the log or log events.

If the firewall implementation application logs are not protected from unauthorized deletion, this is a finding.
Fix Text (F-42285r1_fix)
Create and implement an access control security policy to prevent unauthorized deletion of the firewall implementation application logs.