STIGQter STIGQter: STIG Summary: Network Device Management Security Requirements Guide Version: 4 Release: 1 Benchmark Date: 23 Apr 2021:

The network device must protect audit information from unauthorized modification.

DISA Rule

SV-202040r395823_rule

Vulnerability Number

V-202040

Group Title

SRG-APP-000119

Rule Version

SRG-APP-000119-NDM-000236

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to protect audit information from unauthorized modification.

Check Contents

Determine if the network device protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions, limiting log data locations and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights that the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized modification, this is a finding.

Vulnerability Number

V-202040

Documentable

False

Rule Version

SRG-APP-000119-NDM-000236

Severity Override Guidance

Determine if the network device protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions, limiting log data locations and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights that the user enjoys. This requirement may be verified by demonstration, configuration, or validated test results. If the network device does not protect audit information from unauthorized modification, this is a finding.

Check Content Reference

M

Target Key

2890

Comments