UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must use automated mechanisms to alert security personnel to an organizationally defined list of inappropriate or unusual activities with security implications.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000092-NDM-000063 SRG-NET-000092-NDM-000063 SRG-NET-000092-NDM-000063_rule Low
Description
Auditing of account use and user actions is a critical part of the security architecture. Auditable events must be logged. If the network device becomes unable to write events to the audit log, this is known as an audit processing failure. Audit processing failures include software and hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged into the network device. An example of a mechanism to facilitate this would be through the utilization of SNMP traps.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000092-NDM-000063_chk )
Verify the network device uses automated mechanisms to alert security personnel to an organizationally defined list of inappropriate or unusual activities with security implications. If the network device does not use automated mechanisms to alert security personnel to an organizationally defined list of inappropriate or unusual activities with security implications, this is a finding.
Fix Text (F-SRG-NET-000092-NDM-000063_fix)
Configure the network device to utilize automated mechanisms to alert security personnel to an organizationally defined list of inappropriate or unusual activities with security implications.