The VPN Gateway must protect log information from unauthorized read access if all or some of this data is stored locally.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-207201
SRG-NET-000098-VPN-000370
SV-207201r608988_rule
Low
Description
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or to simply identify an improperly configured VPN gateway. Thus, it is imperative that the collected log data from the various VPN gateways, as well as the auditing tools, be secured and can only be accessed by authorized personnel.
This requirement pertains to securing the VPN log as it is stored locally, on the box temporarily, or while being encapsulated.