STIGQter STIGQter: STIG Summary: F5 BIG-IP Local Traffic Manager 11.x Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 25 Oct 2019: The BIG-IP Core implementation must be configured to protect audit tools from unauthorized deletion.

DISA Rule

SV-74719r2_rule

Vulnerability Number

V-60289

Group Title

SRG-NET-000103-ALG-000061

Rule Version

F5BI-LT-000065

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the BIG-IP Core to protect audit tools from unauthorized deletion.

Check Contents

Verify the BIG-IP Core is configured to protect audit information from unauthorized read access.

Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.

Under 'Log Access', verify unauthorized roles are set to 'Deny'.

If the BIG-IP Core is not configured to protect audit information from unauthorized deletion, this is a finding.

Vulnerability Number

V-60289

Documentable

False

Rule Version

F5BI-LT-000065

Severity Override Guidance

Verify the BIG-IP Core is configured to protect audit information from unauthorized read access.

Navigate to the BIG-IP System manager >> System >> Logs >> Configuration >> Options.

Under 'Log Access', verify unauthorized roles are set to 'Deny'.

If the BIG-IP Core is not configured to protect audit information from unauthorized deletion, this is a finding.

Check Content Reference

M

Target Key

2843

Comments