UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The VPN Gateway must generate log records containing information to establish where the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-207198 SRG-NET-000088-VPN-000310 SV-207198r561344_rule Medium
Description
Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment, and provide forensic analysis, it is essential for security personnel to know where events occurred, such as VPN gateway components, modules, device identifiers, node names, and functionality. Associating information about where the event occurred within the network provides a means of investigating an attack, recognizing resource utilization or capacity thresholds, or identifying an improperly configured VPN gateway.
STIG Date
Virtual Private Network (VPN) Security Requirements Guide 2020-10-02

Details

Check Text ( C-7458r378215_chk )
Verify the VPN Gateway generates log records containing information to establish where the events occurred.

If the VPN Gateway does not generate log records containing information to establish where the events occurred, this is a finding.
Fix Text (F-7458r378216_fix)
Configure the VPN Gateway to generates log records containing information to establish where the events occurred.