Free DISA STIG and SRG Library | Vaulted

V-74065

The Cisco IOS XE router must generate audit records when successful/unsuccessful logon attempts occur.

Finding ID
CISR-ND-000123
Rule ID
SV-88739r2_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-APP-000503-NDM-000320
CCI
CCI-000172
Target Key
(None)
Documentable
No
Discussion

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).

Fix Text

Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo ! login on-failure log login on-success log ! archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys

Check Content

Review the Cisco IOS XE router configuration to determine if it automatically audits account logon. The configuration should look similar to the example below: logging userinfo ! login on-failure log login on-success log ! archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account logon is not automatically audited, this is a finding.