CISC-ND-001240 - The Cisco switch must be configured to generate log records when administrator privileges are modified.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.

Audit records can be generated from various components within the network device (e.g., module or policy filter).


Configure the Cisco switch to generate log records when account privileges are modified as shown in the example below:

Step 1: Configure the AAA servers as shown in the example below:

SW1(config)# radius-server host
SW1(config)# radius-server host

Step 2: Configure an AAA server group as shown in the example below:

SW1(config)# aaa group server radius RADIUS_SERVERS
SW1(config-radius)# server
SW1(config-radius)# server
SW1(config-radius)# exit

Step 3: Enable AAA accounting as shown in the example below:

SW1(config)# aaa accounting default group RADIUS_SERVERS
SW1(config)# end

See Also

Item Details

References: CAT|II, CCI|CCI-000172, Rule-ID|SV-220506r879866_rule, STIG-ID|CISC-ND-001240, STIG-Legacy|SV-110661, STIG-Legacy|V-101557, Vuln-ID|V-220506

Plugin: Cisco

Control ID: 18e5fce675d1603204150fa743b7662487b6fab642dbe52c530541e26af7d9a0