The Cisco ASA must be configured to generate audit records for privileged activities or other system-level access.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-239936SRG-APP-000504-NDM-000321CASA-ND-001230SV-239936r961827_rule2024-08-222
Description
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
ℹ️ Check
Review the Cisco ASA configuration to verify it is compliant with this requirement. The configuration should look similar to the example below. logging enable logging buffered informational Note: The ASA will log all EXEC-mode commands. If the Cisco ASA is not configured to generate log records for privileged activities, this is a finding.
✔️ Fix
Configure the Cisco ASA to generate log records for privileged activities as shown in the example below. ASA(config)# logging enable ASA(config)# logging buffered informational ASA(config)# end