The Riverbed NetIM must generate an alert of all audit failure events.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| low | V-275457 | SRG-APP-000357-NDM-000293 | RIIM-DM-000010 | SV-275457r1147421_rule | 2025-09-29 | 1 |
| Description |
|---|
| To ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial device setup if it is modifiable. The value for the organization-defined audit record storage requirement will depend on the amount of storage available on the network device, the anticipated volume of logs, the frequency of transfer from the network device to centralized log servers, and other factors. |
| ℹ️ Check |
|---|
| Verify the system administrator (SA) and information system security officer (ISSO) are notified in the event of an audit processing failure by using the following command: $ sudo grep -i action_mail_acct /etc/rsyslog.d action_mail_acct = <administrator_email_account> If "action_mail_acct" is not set to the email address of the SA and/or ISSO, is commented out, or is missing, this is a finding. |
| ✔️ Fix |
|---|
| Configure the "/etc/rsyslog.d" service to notify the SA and ISSO in the event of an audit processing failure. 1. Add or modify the following line in the "/etc/rsyslog.d" file: action_mail_acct = <administrator_email_account> Note: Change "administrator_email_account" to the email address of the SA and/or ISSO. 2. Restart rsyslog service. $ sudo service rsyslog restart Note: An email package must be installed on the system for email notifications to be sent. |