STIGQter STIGQter: STIG Summary: Cisco IOS XE Router NDM Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The Cisco router must be configured to protect against an individual falsely denying having performed organization-defined actions to be covered by non-repudiation.

DISA Rule

SV-215815r531083_rule

Vulnerability Number

V-215815

Group Title

SRG-APP-000080-NDM-000220

Rule Version

CISC-ND-000210

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to log administrator activity as shown in the example below.

R1(config)#logging userinfo
R1(config)#archive
R1(config-archive)#log config
R1(config-archive-log-cfg)#logging enable
R1(config-archive-log-cfg)#end

Check Contents

Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below.

hostname R1
!
logging userinfo
!



archive
log config
logging enable
!

Note: The logging userinfo global configuration command will generate a log when a user increases his or her privilege level.

If logging of administrator activity is not configured, this is a finding.

Vulnerability Number

V-215815

Documentable

False

Rule Version

CISC-ND-000210

Severity Override Guidance

Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below.

hostname R1
!
logging userinfo
!



archive
log config
logging enable
!

Note: The logging userinfo global configuration command will generate a log when a user increases his or her privilege level.

If logging of administrator activity is not configured, this is a finding.

Check Content Reference

M

Target Key

4020

Comments