Are audit logs available for all changes to the network, firewall, IDS, and IPS systems?
Explanation
Example Responses
Example Response 1
Yes, our organization maintains comprehensive audit logs for all changes to network infrastructure, firewalls, IDS, and IPS systems All configuration changes, rule modifications, policy updates, and administrative actions are automatically logged with timestamps, user identification, source IP address, and the specific changes made These logs are stored in a centralized SIEM (Security Information and Event Management) system for a minimum of 12 months, with critical logs retained for 3 years to meet compliance requirements The logs are write-protected and access to them is strictly limited to authorized security personnel Additionally, we've implemented automated alerts for critical changes that require approval through our change management process, and all logs undergo weekly review as part of our security operations procedures.
Example Response 2
Yes, we maintain detailed audit logs across our network and security infrastructure Our Palo Alto firewalls, Cisco network equipment, and Suricata IDS/IPS are all configured to send logs to our Splunk platform Every configuration change is logged with the administrator's identity, timestamp, action performed, and previous/new values We enforce role-based access control for administrative functions, and all privileged access requires multi-factor authentication Our log retention policy mandates keeping these audit logs for 24 months, and they are backed up daily to an immutable storage solution to prevent tampering We've also implemented automated comparison of current configurations against approved baselines, with alerts generated for any unauthorized deviations.
Example Response 3
No, we currently have partial audit logging capabilities for our network infrastructure While our primary firewall (Fortinet) maintains logs of configuration changes, our legacy network switches and routers do not consistently generate audit logs for all administrative actions Additionally, our recently deployed IDS solution logs detection events but does not comprehensively track changes to its configuration We recognize this as a gap in our security controls and have initiated a project to implement centralized logging across all network and security devices, with expected completion in the next quarter In the interim, we're mitigating risk through strict change management procedures that require documented approval before any modifications to these systems.
Context
- Tab
- Infrastructure
- Category
- Firewalls, IDS, IPS, and Networking

