GEN006600 - The system's access control program must log each system access attempt.

Information

If access attempts are not logged, then multiple attempts to log on to the system by an unauthorized user may go undetected.

Solution

Configure the access restriction program to log every access attempt. Ensure the implementation instructions for TCP_WRAPPERS are followed, so system access attempts are logged into the system log files. If an alternate application is used, it must support this function.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-227956r603266_rule, STIG-ID|GEN006600, STIG-Legacy|SV-941, STIG-Legacy|V-941, Vuln-ID|V-227956

Plugin: Unix

Control ID: cc73fd54ff849bcf125e2bff1545bfef607da6a1f055113cedca19e8ae15fdc5