Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-4584 | NET1021 | SV-4584r3_rule | ECAT-1 ECAT-2 ECSC-1 | Low |
Description |
---|
Logging is a critical part of router security. Maintaining an audit trail of system activity logs (syslog) can help identify configuration errors, understand past intrusions, troubleshoot service disruptions, and react to probes and scans of the network. Syslog levels 0-6 are the levels required to collect the necessary information to help in the recovery process. |
STIG | Date |
---|---|
Perimeter Router Security Technical Implementation Guide | 2015-07-01 |
Check Text ( C-3950r6_chk ) |
---|
Review the network device configuration to ensure all messages up to and including severity level 6 (informational) are logged and sent to a syslog server. Severity Level Message Type 0 Emergencies 1 Alerts 2 Critical 3 Errors 4 Warning 5 Notifications 6 Informational 7 Debugging If logging does not capture of up severity level 6, this is a finding. |
Fix Text (F-4517r6_fix) |
---|
Configure the network device to log all messages except debugging and send all log data to a syslog server. |