Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000173-NDM-000132 | SRG-NET-000173-NDM-000132 | SRG-NET-000173-NDM-000132_rule | Low |
Description |
---|
This requirement pertains to the use of privileged access when establishing a diagnostic session connecting non-locally (i.e., from the network or using an auxiliary port) to perform session on the servers and network devices. Methods of accessing the network device remotely include, but are not limited to, HTTPS, SSH, and VPN. If events associated with non-local administrative access or diagnostic sessions are not logged, a major tool for assessing and investigating attacks would not be available. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000173-NDM-000132_chk ) |
---|
Verify all sessions initiated using the GUI or SSH are logged in either the site's centralized audit log or the network device audit log. Examine the events in the audit log to see if diagnostic and maintenance sessions are annotated with a separate event code. If non-local maintenance and diagnostic sessions are not captured in the network device audit logs, this is a finding. |
Fix Text (F-SRG-NET-000173-NDM-000132_fix) |
---|
Configure the auditable events to capture all non-local sessions. Configure the auditable events to capture diagnostic and maintenance sessions. |