PANW-IP-000039 - The Palo Alto Networks security platform must off-load log records to a centralized log server.

Information

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is compromised.

This also prevents the log records from being lost if the logs stored locally are accidentally or intentionally deleted, altered, or corrupted.

Solution

To create a syslog server profile:
Go to Device >> Server Profiles >> Syslog
Select 'Add'.
In the Syslog Server Profile, enter the name of the profile.
Select 'Add'.
In the 'Servers' tab, enter the required information.
Name: Name of the syslog server
Server: Server IP address where the logs will be forwarded to
Port: Default port 514
Facility: Select from the drop down list
Select 'OK'.

After you create the Server Profiles that define where to send your logs, you must enable log forwarding.
The way to enable forwarding depends on the log type:
Traffic Logs- Enable forwarding of Traffic logs by creating a Log Forwarding Profile (Objects >> Log Forwarding) and adding it to the security policies you want to trigger the log forwarding. Only traffic that matches a specific rule within the security policy will be logged and forwarded.
Configure the log-forwarding profile to select the logs to be forwarded to syslog server.
Go to Objects >> Log forwarding
The 'Log Forwarding Profile' window appears. Note that it has five columns. In the 'Syslog' column, select the syslog server profile for forwarding threat logs to the configured server(s).
Select 'OK'.

When the 'Log Forwarding Profile' window disappears, the screen will show the configured log-forwarding profile.
Threat Logs-You enable forwarding of Threat logs by creating a Log Forwarding Profile (Objects >> Log Forwarding) that specifies which severity levels you want to forward and then adding it to the security policies for which you want to trigger the log forwarding. A Threat log entry will only be created (and therefore forwarded) if the associated traffic matches a Security Profile (Antivirus, Anti-spyware, Vulnerability, URL Filtering, File Blocking, Data Filtering, or DoS Protection).
Configure the log-forwarding profile to select the logs to be forwarded to syslog server.
Go to Objects >> Log forwarding.
The 'Log Forwarding Profile' window appears. Note that it has five columns. In the 'Syslog' column, select the syslog server profile for forwarding threat logs to the configured server(s).
Select 'OK'.

When the 'Log Forwarding Profile' window disappears, the screen will show the configured log-forwarding profile.
System Logs-You enable forwarding of System logs by specifying a Server Profile in the log settings configuration.
Go to Device >> Log Settings >> System Logs
The list of severity levels is displayed.

Select a Server Profile for each severity level to forward.
Select each severity level in turn; with each selection, the 'Log Systems - Setting' window will appear.
In the 'Log Systems - Setting' window, in the 'Syslog' drop-down box, select the configured Server Profile.
Select 'OK'.

Config Logs-You enable forwarding of Config logs by specifying a Server Profile in the log settings configuration.
Go to Device >> Log Settings >> Config Logs
Select the 'Edit' icon (the gear symbol in the upper-right corner of the pane).
In the 'Log Settings Config' window, in the 'Syslog' drop-down box, select the configured Server Profile.
Select 'OK'.

For Traffic Logs and Threat Logs, use the log forwarding profile in the security rules.
Go to Policies >> Security Rule
Select the rule for which the log forwarding needs to be applied. Apply the security profiles to the rule.
Go to Actions >> Log forwarding
Select the log forwarding profile from drop-down list.
Commit changes by selecting 'Commit' in the upper-right corner of the screen. Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y24M10_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), CAT|III, CCI|CCI-001851, Rule-ID|SV-207702r856616_rule, STIG-ID|PANW-IP-000039, STIG-Legacy|SV-77165, STIG-Legacy|V-62675, Vuln-ID|V-207702

Plugin: Palo_Alto

Control ID: db3f359071a70e244df069da70bf84c52468bb3af5ff18d6feae1640334aa7ea