Details
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Audit records can be generated from various components within the information system (e.g., module or policy filter).
Solution
Configure the Cisco router to log all logon attempts as shown in the example below.
R1(config)#login on-failure log
R1(config)#login on-success log
R1(config)#end
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Cisco.
References
- 800-53|AU-12c.
- CAT|II
- CCI|CCI-000172
- Rule-ID|SV-215816r531083_rule
- STIG-ID|CISC-ND-000250
- STIG-Legacy|SV-105359
- STIG-Legacy|V-96221
- Vuln-ID|V-215816