UCF STIG Viewer Logo

The network device must protect audit logs from unauthorized deletion.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000100-NDM-000069 SRG-NET-000100-NDM-000069 SRG-NET-000100-NDM-000069_rule Low
Description
Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured system. Audit log data must be protected from unauthorized access, including from legitimate administrators who do not have a need for this type of access. Unauthorized deletion of logs or events may obfuscate evidence of an attack. Event log entries must not be deleted.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000100-NDM-000069_chk )
Verify a security policy for the audit logs is in place which allows only system administrators with the proper authorization to delete the audit log on the network device.

If audit logs are not protected from unauthorized deletion, this is a finding.
Fix Text (F-SRG-NET-000100-NDM-000069_fix)
Create and implement an access control security policy to prevent unauthorized deletion of the audit logs on the network device.