SV-75341r1_rule
V-60883
SRG-APP-000516-NDM-000317
AMLS-NM-000420
CAT II
10
Configure the system to protect the audit records of nonlocal accesses to privileged accounts and the execution of privileged functions.
Enable remote logging with:
config
logging host a.b.c.d
logging trap informational
To assign a user to a role, use the command:
username [name] role [role name]
To deny access to logging functions via RBAC:
role [name]
deny command logging [all]
Review the network device account configuration files to determine if the privileged functions to access and modify audit settings and files are restricted to authorized security personnel. Review locations of audit logs generated as a result of nonlocal accesses to privileged accounts and the execution of privileged functions. Verify there are appropriate controls and permissions to protect the audit information from unauthorized access.
If the audit records that are generated upon nonlocal access to privileged accounts or upon the execution of privileged functions are not protected, this is a finding.
Verify remote logging is enabled via the "Show Logging" command.
Verify that individual accounts do not have access to logging functionality by executing the "show user-account" command and validating that only intended users are assigned to roles that permit access to logging functions. To verify what permissions are allowed by each role, execute the "show roles" command.
V-60883
False
AMLS-NM-000420
Review the network device account configuration files to determine if the privileged functions to access and modify audit settings and files are restricted to authorized security personnel. Review locations of audit logs generated as a result of nonlocal accesses to privileged accounts and the execution of privileged functions. Verify there are appropriate controls and permissions to protect the audit information from unauthorized access.
If the audit records that are generated upon nonlocal access to privileged accounts or upon the execution of privileged functions are not protected, this is a finding.
Verify remote logging is enabled via the "Show Logging" command.
Verify that individual accounts do not have access to logging functionality by executing the "show user-account" command and validating that only intended users are assigned to roles that permit access to logging functions. To verify what permissions are allowed by each role, execute the "show roles" command.
M
2825