CISC-ND-001280 - The Cisco switch must generate audit records showing starting and ending time for administrator access to the system.

Information

Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.

Audit records can be generated from various components within the network device (e.g., module or policy filter).

Solution

Step 1: Configure the switch to use an authentication server as shown in the following example:

SW1(config)#radius host 10.1.48.2 key xxxxxx

Step 2: Configure the switch to report session start and stop times for administrative access as shown in the following example:

SW1(config)#aaa accounting exec default start-stop group radius

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_XE_Switch_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12(1), CAT|II, CCI|CCI-000172, Rule-ID|SV-110579r1_rule, STIG-ID|CISC-ND-001280, Vuln-ID|V-101475

Plugin: Cisco

Control ID: c51bb673863ac8f2bbd2cf51cd6d64a014b6d92edd8bb08c480f6bd8c82f5565