UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must provide the capability for organization-identified individuals or roles to change the auditing to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69361 APSC-DV-000610 SV-83983r1_rule Medium
Description
If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost. This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real-time, within minutes, or within hours.
STIG Date
Application Security and Development Security Technical Implementation Guide 2018-12-24

Details

Check Text ( C-69775r1_chk )
Review the application documentation and interview the application administrator to identify the auditing configuration capabilities of the application.

Access the audit management settings of the application as an authorized user and evaluate the verbosity capabilities of the log settings.

Determine if the settings are available to readily increase or decrease logging verbosity on demand for identified roles or individuals.

Review log files and identify what information is retained in the logs.

Increase logging verbosity to include additional application components or details in the logs. For example, if standard log settings do not include connection resets or process errors, add those settings to the log configuration and re-examine the logs to ensure the number of data points being logged has increased and includes those values.

Next decrease logging verbosity to the minimum data and re-examine the logs to ensure the log verbosity has changed.

If the application does not have the ability for specific roles or individuals to change the auditing verbosity performed on all application components, this is a finding.
Fix Text (F-75535r1_fix)
Design the application to provide the capability for individuals or roles to change the auditing to be performed on all application components.