The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-251788 | TNDM-3X-000090 | SV-251788r879887_rule | CCI-000169 | medium |
| Description | ||||
| Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis. | ||||
| STIG | Date | |||
| VMware NSX-T Manager NDM Security Technical Implementation Guide | 2023-06-22 | |||
Details
Check Text (C-251788r879887_chk)
From an NSX-T Manager shell, run the following command(s):
> get service async_replicator | find Logging
> get service http | find Logging
> get service manager | find Logging
> get service policy | find Logging
Expected result:
Logging level: info
If the output does not match the expected result, this is a finding.
Fix Text (F-55202r810366_fix)
From an NSX-T Manager shell, run the following command(s):
> set service async_replicator logging-level info
> set service http logging-level info
> set service manager logging-level info
> set service policy logging-level info