STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to NetApp ONTAP DSC 9.x Security Technical Implementation Guide

V-246964

CAT I (High)

ONTAP must be configured to send audit log data to a central log server.

Rule ID

SV-246964r1137890_rule

STIG

NetApp ONTAP DSC 9.x Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001851

Discussion

The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in security that enable the network IA team to find and address these weaknesses before breaches can occur. Reviewing these logs, whether before or after a security breach, are important in showing whether someone is an internal employee or an outside threat.

Check Content

Use "cluster log-forwarding show" to see if audit logs are being sent to a remote logging server.

Sample output from the command:

                                                                                           Verify   Syslog
Destination Host         Port   Protocol                   Server   Facility
------------------------ ------ ----------------------- --------  --------
192.168.0.1                     514    udp-unencrypted false       user

If no remote logging servers are listed, this is a finding.

Fix Text

Configure ONTAP for remote syslogging with "cluster log-forwarding create -destination <hostname_or_ip_address>".