Network Device Management Rules : Generating audit records
  
Generating audit records
Rule Title: RiOS must provide audit record generation capability for DoD-defined auditable events within the network device.
STIG ID: RICX-DM-000071
Rule ID: SV-77423r1_rule Severity: CAT II
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Audit records can be generated from various components within the network device (for example, process, module). Certain specific device functionalities might be audited as well. The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records.
The DoD has defined the list of events for which the device will provide an audit record generation capability as the following:
Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (for example, classification levels);
Access actions, such as successful and unsuccessful log in attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent log ins from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the information system; and
All account creation, modification, disabling, and termination actions.
Verifying if the system is generating audit records
Verify that RiOS is configured to off-load audit records (logs) onto a different system than the system being audited.
1. Connect to the Management Console.
2. Choose Administration > System Settings: Logging to display the Logging page.
3. Under Remote Log Servers verify the list contains IP addresses for all available log servers. If no servers are listed or some are missing, this is a security vulnerability finding.
4. Under Per-Process Logging, verify if a process or severity is listed. (Per-process logging only affects the system log, not the user type facilities.) If a filter has been added in Per-Process Logging that prevents the capture of DoD-defined auditable events, this is a security vulnerability finding.
Configuring the system to generate audit records
Configure RiOS to off-load audit records onto a different system than the system being audited.
1. Connect to the Management Console.
2. Choose Administration > System Settings: Logging to display the Logging page.
3. Click Add a New Log Server to expand the page.
4. Set Server IP to the IP address of the remote log server.
5. Select Info from the Minimum Severity drop-down list.
6. Click Add.
7. Under Per-Processing Logging, if any of the filtered processes violate the capture of DoD-defined auditable events, select the check box next to the name and click Remove Selected.
8. Click Apply.