UCF STIG Viewer Logo

The application server must produce audit records containing sufficient information to establish when (date and time) the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35165 SRG-APP-000096-AS-000059 SV-46452r1_rule Low
Description
Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control includes time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. In addition to logging event information, application servers must also log the corresponding dates and times of these events. Examples of event data include, but are not limited to, Java Virtual Machine (JVM) activity, HTTPD activity and app server related system process activity.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43547r1_chk )
Review the audit logs on the AS to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix Text (F-39715r1_fix)
Configure the AS auditing system to log date and time with the event.