JUSX-DM-000044 - The Juniper SRX Services Gateway must generate log records when privileged commands are executed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.

Solution

Configure at least one external syslog host to log facility any and severity info or any. There are multiple ways to accomplish this, the following is an example.

[edit system syslog]
set host <syslog server address> any any

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000172, Rule-ID|SV-223195r513277_rule, STIG-ID|JUSX-DM-000044, STIG-Legacy|SV-81057, STIG-Legacy|V-66567, Vuln-ID|V-223195

Plugin: Juniper

Control ID: 8a400ee814b81749bea6bb2cc467df69211d843711a25c1e81add8881cff29d3