STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP TMOS NDM Security Technical Implementation Guide

V-266074

CAT III (Low)

The F5 BIG-IP appliance must manage local audit storage capacity in accordance with organization-defined audit record storage requirements.

Rule ID

SV-266074r1024605_rule

STIG

F5 BIG-IP TMOS NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001849

Discussion

To ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial device setup if it is modifiable. The value for the organization-defined audit record storage requirement will depend on the amount of storage available on the network device, the anticipated volume of logs, the frequency of transfer from the network device to centralized log servers, and other factors.

Check Content

Verify the site configures the local audit record storage capacity using any of the following log-related elements in accordance with the site's System Security Plan:
- Log rotation frequency.
- Age at which log files become eligible for removal.
- The number of archive copies that the system retains.
- The message count for alertd log check.

If the site does not manage log storage capacity in compliance with the SSP or if the process is not documented, this is a finding.

Fix Text

To manage audit record storage capacity, configure the following log-related elements on the BIG-IP system in accordance with the site's System Security Plan:
- Change the log rotation frequency.
- Change the age at which log files become eligible for removal.
- Change the number of archive copies that the system retains.
- Change the message count for alertd log check.