UCF STIG Viewer Logo

The firewall must be configured to allow the system administrator to select a subset of DoD-required auditable events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-79487 SRG-NET-000113-FW-000005 SV-94193r1_rule Low
Description
The generation of logs with a subset of criteria aide the system administrator, maintainers, and auditors when troubleshooting issues or reviewing the log for trends or security breaches. Traffic log records can be generated from various components within the information system (e.g., network interface, access control list, or filter). The DoD list of auditable events include the logging and audit requirements required by this document and any additional local requirements.
STIG Date
Firewall Security Requirements Guide 2018-12-24

Details

Check Text ( None )
None
Fix Text (None)
None