Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000096-NDM-000065 | SRG-NET-000096-NDM-000065 | SRG-NET-000096-NDM-000065_rule | Low |
Description |
---|
In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network device must support the organization's capability to correlate the audit log data from multiple network devices to acquire a clear understanding of events. In order to correlate auditable events, timestamps are needed on all of the log records. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000096-NDM-000065_chk ) |
---|
Verify the network device is configured to use the internal system clock to generate the timestamp included with the audit log entry. If the network device is not configured to use the internal system clock to generate timestamps for audit records, this is a finding. |
Fix Text (F-SRG-NET-000096-NDM-000065_fix) |
---|
Configure the network device to use the internal system clock to generate the timestamp included with audit log entries. |