UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must protect audit log information from unauthorized read access.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000098-NDM-000067 SRG-NET-000098-NDM-000067 SRG-NET-000098-NDM-000067_rule Low
Description
Auditing of account use and user actions is a critical part of the security architecture. Auditable events must be logged. If the network device becomes unable to write events to the audit log, this is known as an audit processing failure. Audit processing failures include software and hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Audit log data must be protected from unauthorized access. Without this protection, a compromise or loss of log data needed for incident analysis or risk assessment could result.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000098-NDM-000067_chk )
Verify a security policy for the audit logs is in place which allows only system administrators with the proper authorization to read the audit log on the network device.

If audit logs are not protected from unauthorized read access, this is a finding.
Fix Text (F-SRG-NET-000098-NDM-000067_fix)
Create and implement an access control security policy to prevent unauthorized read access of the audit logs on the network device.