Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34545 | SRG-NET-000079-IDPS-00064 | SV-45387r1_rule | Low |
Description |
---|
Log record content that may be necessary to satisfy this requirement includes timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked. This capability is critical for accurate forensic analysis. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42736r1_chk ) |
---|
Examine the audit log configuration on the IDPS components (including the sensors) or view several alert records on organization's central audit log server. Search for events showing some or all of the following: timestamps, source and destination addresses, user/process identifiers, event descriptions, success or failure indications, file names involved, and access control or flow control rules invoked. If the audit log event records do not include sufficient information to establish the identity of any user accounts associated with the event, this is a finding. |
Fix Text (F-38784r1_fix) |
---|
Configure the IDPS components, to ensure entries sent to the audit log include sufficient information to establish the identity of any user accounts associated with the event (e.g., timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked). |