Skip to content

Attempts to access ports, protocols, or services that are denied are not logged..

An XCCDF Rule

Description

<VulnDiscussion>Logging or auditing of failed access attempts is a necessary component for the forensic investigation of security incidents. Without logging there is no way to demonstrate that the access attempt was made or when it was made. Additionally a pattern of access failures cannot be demonstrated to assert that an intended attack was being made as apposed to an accidental intrusion. The IAO/NSO will ensure that all attempts to any port, protocol, or service that is denied are logged.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts>If sufficient space is not allowed for logging or auditing, a denial of service or loss of data could be caused by overflowing the space allocated.</PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><Responsibility>Network Security Officer</Responsibility><IAControls></IAControls>

ID
SV-6794r1_rule
Severity
Low
Updated



Remediation - Manual Procedure

Develop a plan to implement the logging of failed or rejected ports, protocols or services requests.  The plan should include a projection of the storage requirements of the logged events.  Obtain CM approval of the plan and execute it.