The Juniper SRX Services Gateway must generate log records when privileged commands are executed.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-223195 | JUSX-DM-000044 | SV-223195r961827_rule | Low |
Description |
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. |
STIG | Date |
Juniper SRX Services Gateway NDM Security Technical Implementation Guide | 2024-12-20 |
Details
Check Text (C-24868r513275_chk) |
Verify the device generates a log when login events occur. [edit] show system syslog host <syslog server address> { any any; source-address <device address>; } If an external syslog host is not configured to log, or configured for facility any severity any, this is a finding. |
Fix Text (F-24856r513276_fix) |
Configure at least one external syslog host to log facility any and severity info or any. There are multiple ways to accomplish this, the following is an example. [edit system syslog] set host <syslog server address> any any |