UCF STIG Viewer Logo

The network element must protect the audit records of non-local accesses to privileged accounts and the execution of privileged functions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27223 SRG-NET-000286 SV-34522r1_rule Medium
Description
Auditing may not be reliable when performed by the network element to which the user being audited has privileged access. The privileged user may inhibit auditing or modify audit records. This control enhancement helps mitigate this risk by requiring that privileged access be further defined between audit-related privileges and other privileges, thus, limiting the users with audit-related privileges. Reducing the risk of audit compromises by privileged users can also be achieved, for example, by performing audit activity on a separate information system or by using storage media that cannot be modified (e.g., write-once recording devices).
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None