Free DISA STIG and SRG Library | Vaulted

V-73985

The Cisco IOS XE router must generate audit records when successful/unsuccessful attempts to access privileges occur.

Finding ID
CISR-ND-000025
Rule ID
SV-88659r2_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-APP-000091-NDM-000223
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).

Fix Text

Configure the Cisco IOS XE router to enable auditing. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys

Check Content

Verify that the Cisco IOS XE router is configured to generate audit records when successful/unsuccessful attempts to access privileges. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If audit records are not being generated, this is a finding.