STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to F5 BIG-IP TMOS NDM Security Technical Implementation Guide

V-266074

CAT III (Low)

The F5 BIG-IP appliance must manage local audit storage capacity in accordance with organization-defined audit record storage requirements.

Rule ID

SV-266074r1024605_rule

STIG

F5 BIG-IP TMOS NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001849

Discussion

To ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial device setup if it is modifiable. The value for the organization-defined audit record storage requirement will depend on the amount of storage available on the network device, the anticipated volume of logs, the frequency of transfer from the network device to centralized log servers, and other factors.

Check Content

Verify the site configures the local audit record storage capacity using any of the following log-related elements in accordance with the site's System Security Plan:
- Log rotation frequency.
- Age at which log files become eligible for removal.
- The number of archive copies that the system retains.
- The message count for alertd log check.

If the site does not manage log storage capacity in compliance with the SSP or if the process is not documented, this is a finding.

Fix Text

To manage audit record storage capacity, configure the following log-related elements on the BIG-IP system in accordance with the site's System Security Plan:
- Change the log rotation frequency.
- Change the age at which log files become eligible for removal.
- Change the number of archive copies that the system retains.
- Change the message count for alertd log check.