-
Notifications
You must be signed in to change notification settings - Fork 11
/
V-93107.rb
58 lines (48 loc) · 2.16 KB
/
V-93107.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
# encoding: UTF-8
control "V-93107" do
title "Windows Server 2019 must be configured to audit System - IPsec Driver
failures."
desc "Maintaining an audit trail of system activity logs can help identify
configuration errors, troubleshoot service disruptions, and analyze compromises
that have occurred, as well as detect attacks. Audit logs are necessary to
provide a trail of evidence in case the system or network is compromised.
Collecting this data is essential for analyzing the security of information
assets and detecting signs of suspicious and unexpected behavior.
IPsec Driver records events related to the IPsec Driver, such as dropped
packets."
desc "rationale", ""
desc 'check', "Security Option \"Audit: Force audit policy subcategory settings (Windows
Vista or later) to override audit policy category settings\" must be set to
\"Enabled\" (WN19-SO-000050) for the detailed auditing subcategories to be
effective.
Use the \"AuditPol\" tool to review the current Audit Policy configuration:
Open \"PowerShell\" or a \"Command Prompt\" with elevated privileges (\"Run
as administrator\").
Enter \"AuditPol /get /category:*\"
Compare the \"AuditPol\" settings with the following:
If the system does not audit the following, this is a finding.
System >> IPsec Driver - Failure"
desc 'fix', "Configure the policy value for Computer Configuration >>
Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >>
System Audit Policies >> System >> \"Audit IPsec Driver\" with \"Failure\"
selected."
impact 0.5
tag 'severity': nil
tag 'gtitle': 'SRG-OS-000327-GPOS-00127'
tag 'satisfies': ["SRG-OS-000327-GPOS-00127", "SRG-OS-000458-GPOS-00203",
"SRG-OS-000463-GPOS-00207", "SRG-OS-000468-GPOS-00212"]
tag 'gid': 'V-93107'
tag 'rid': 'SV-103195r1_rule'
tag 'stig_id': 'WN19-AU-000330'
tag 'fix_id': 'F-99353r1_fix'
tag 'cci': ["CCI-000172", "CCI-002234"]
tag 'nist': ["AU-12 c", "AC-6 (9)", "Rev_4"]
describe.one do
describe audit_policy do
its('IPsec Driver') { should eq 'Failure' }
end
describe audit_policy do
its('IPsec Driver') { should eq 'Success and Failure' }
end
end
end