UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must record the username or user ID of the user associated with the event.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69379 APSC-DV-000700 SV-84001r1_rule Medium
Description
When users conduct activity within an application, that user’s identity must be recorded in the audit log. Failing to record the identity of the user responsible for the activity within the application is detrimental to forensic analysis.
STIG Date
Application Security and Development Security Technical Implementation Guide 2017-03-20

Details

Check Text ( C-69793r1_chk )
Review and monitor the application logs.

Connect to the application and perform application activity that is allowed by the user such as accessing data or running reports.

Observe if the log includes an entry to indicate the user ID of the user that conducted the activity.

If the user ID is not recorded along with the event in the event log, this is a finding.
Fix Text (F-75553r1_fix)
Configure the application to record the user ID of the user responsible for the log event entry.