Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34571 | SRG-NET-000096-IDPS-00070 | SV-45425r1_rule | Low |
Description |
---|
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the IDPS must support the organization's capability to correlate the audit log data from multiple IDPS components to acquire a clear understanding of events. In order to correlate auditable events, timestamps are needed on all of the log records. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42775r1_chk ) |
---|
Verify the IDPS components, including sensors, are configured to use the internal system clock to generate the date/timestamp included with the audit log entry. If IDPS components are not configured to use internal system clocks to generate timestamps for audit records, this is a finding. |
Fix Text (F-38822r1_fix) |
---|
Configure all IDPS components, including sensors, to use the internal system clock to generate the date/timestamp included with the audit log entry. |