1.1.7 Set 'aaa accounting' to log all privileged use commands using 'commands 15'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Runs accounting for all commands at the specified privilege level.

Rationale:

Authentication, authorization and accounting (AAA) systems provide an authoritative source for managing and monitoring access for devices. Centralizing control improves consistency of access control, the services that may be accessed once authenticated and accountability by tracking services accessed. Additionally, centralizing access control simplifies and reduces administrative costs of account provisioning and de-provisioning, especially when managing a large number of devices. AAA Accounting provides a management and audit trail for user and administrative sessions through RADIUS or TACACS+.

Solution

Configure AAA accounting for commands.

hostname(config)#aaa accounting commands 15 {default | list-name | guarantee-first}
{start-stop | stop-only | none} {radius | group group-name}

Impact:

Enabling 'aaa accounting' for privileged commands records and sends activity to the accounting servers and enables organizations to monitor and analyze privileged activity.

Default Value:

AAA accounting is disabled.

Notes:

Valid privilege level entries are integers from 0 through 15.

See Also

https://workbench.cisecurity.org/files/2585

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12(1), CSCv6|5

Plugin: Cisco

Control ID: bf079eb97867268e9fc46f480987063cd8af5364c7ab80b2ba9d103e53b93cc5