Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-69407 | APSC-DV-000840 | SV-84029r1_rule | Medium |
Description |
---|
Privileged activities include the tasks or actions taken by users in an administrative role (admin, backup operator, manager, etc.) which are used to manage or reconfigure application function. Examples include but are not limited to: Modifying application logging verbosity, starting or stopping of application services, application user account management, managing application functionality, or otherwise changing the underlying application capabilities such as adding a new application module or plugin. Privileged access does not include an application design which does not modify the application but does provide users with the functionality or the ability to manage their own user specific preferences or otherwise tailor the application to suit individual user needs based upon choices or selections built into the application. |
STIG | Date |
---|---|
Application Security and Development Security Technical Implementation Guide | 2019-09-30 |
Check Text ( C-69825r1_chk ) |
---|
Review and monitor the application logs. Authenticate to the application as a privileged user and observe if the log includes an entry to indicate the user’s authentication was successful. Perform actions as an admin or other privileged user such as modifying the logging verbosity, or starting or stopping an application service, or terminating a test user session. If log events that correspond with the actions performed are not recorded in the logs, this is a finding. |
Fix Text (F-75583r1_fix) |
---|
Configure the application to write a log entry when privileged activities or other system-level events occur. |