UCF STIG Viewer Logo

The Application Server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35744 SRG-APP-000063-AS-000030 SV-47031r1_rule Medium
Description
In order to be able to provide a forensic history of activity, the application server must ensure users who are granted a privileged role or those who utilize a separate distinct account when accessing privileged functions or data have their actions logged. If privileged activity is not logged, no forensic logs can be used to establish accountability for privileged actions that occur on the system.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-44087r1_chk )
Review AS documentation and audit configuration to verify the AS logs privileged activity. If the AS is not configured to log privileged activity, this is a finding.
Fix Text (F-40287r1_fix)
Configure the AS to log privileged activity.