The RUCKUS ICX device must generate audit records containing the full-text recording of privileged commands.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-273789 | RCKS-NDM-000250 | SV-273789r1110840_rule | Medium |
Description |
Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. The additional information required is dependent on the type of information (i.e., sensitivity of the data and the environment within which it resides). At a minimum, the organization must audit full-text recording of privileged commands. The organization must maintain audit trails in sufficient detail to reconstruct events to determine the cause and impact of compromise. |
STIG | Date |
RUCKUS ICX NDM Security Technical Implementation Guide | 2025-05-28 |
Details
Check Text (C-77880r1110546_chk) |
Verify logging is enabled: SSH@ICX(config)# show running-config | include logging logging console logging persistence logging cli-command logging host x.x.x.x logging host y.y.y.y If "logging cli-command" is not present or "no logging on" exists, this is a finding. |
Fix Text (F-77785r1110547_fix) |
Enable CLI command logging: SSH@ICX(config)# logging cli-command SSH@ICX(config)# exit SSH@ICX# write memory |