UCF STIG Viewer Logo

The IDPS must protect sensor event logs from unauthorized deletion.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34567 SRG-NET-999999-IDPS-00233 SV-45418r1_rule Medium
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Sensor event log data must be protected from unauthorized access, including from legitimate administrators who do not need for this type of access. Unauthorized deletion of logs or events may obfuscate evidence of an attack. Event log and sensor log entries should not be deleted without a clear audit trail and an approval process. Sensor log deletion, when performed directly by system administrators, must generate an audit log entry in compliance with CCI-000172.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42767r1_chk )
Verify a security policy for the sensor event logs is in place which allows only system administrators with the proper authorization to delete the sensor log on the sensors and management console.

If event logs are not protected from unauthorized deletion, this is a finding.
Fix Text (F-38814r1_fix)
Create and implement an access control security policy to prevent unauthorized deletion of the sensor event logs on the management console and sensors.