Network Device Management Rules : Ensuring log events of privileged commands are generated
  
Ensuring log events of privileged commands are generated
Rule Title: RiOS must generate audit records (log events) containing the full-text recording of privileged commands.
STIG ID: RICX-DM-000049
Rule ID: SV-77389r1_rule Severity: CAT II
Vuln ID: V-62899 Class: Unclass
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information.
Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. The additional information required is dependent on the type of information (that is, sensitivity of the data and the environment within which it resides). At a minimum, the organization must audit full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of the security compromise.
Verifying log events are generated for privileged commands
Verify that RiOS is configured to generate audit records (log events) containing the full-text recording of privileged commands.
For detailed information, see Verifying log events are generated when accounts are created.
Generating log events for privileged commands
Configure RiOS to generate audit records (log events) containing the full-text recording of privileged commands.