UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must automatically audit account enabling actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69321 APSC-DV-000420 SV-83943r1_rule Medium
Description
When application accounts are enabled, user accessibility is affected. Accounts are utilized for identifying individual application users or for identifying the application processes themselves. In order to detect and respond to events affecting user accessibility and application processing, applications must audit account removal actions and, as required, notify the appropriate individuals, so they can investigate the event. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. Application developers are encouraged to integrate their applications with enterprise-level authentication/access/audit mechanisms such as Syslog, Active Directory or LDAP.
STIG Date
Application Security and Development Security Technical Implementation Guide 2020-06-12

Details

Check Text ( C-69733r1_chk )
Examine the application documentation or interview the application representative to identify how the application users are managed.

Identify the location of the audit logs and review the end of the logs.

Access the user account management functionality and enable a test user account.

Examine the log file again and determine if the account enable event was logged. The information logged should, at a minimum, include enough detail to determine which account was enabled and when.

If the account enabling event information was not logged, this is a finding.
Fix Text (F-75495r1_fix)
Configure the application to write a log entry when a user account is enabled.

At a minimum, ensure account name, date and time of the event are recorded.