UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must produce log records containing sufficient information to establish where the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35167 SRG-APP-000097-AS-000060 SV-46454r3_rule Medium
Description
Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the correct location or process within the application server where the events occurred is important during forensic analysis. To determine where an event occurred, the log data must contain data such as application components, modules, session identifiers, filenames, host names, and functionality.
STIG Date
Application Server Security Requirements Guide 2015-08-28

Details

Check Text ( C-43549r3_chk )
Review the logs on the application server to determine if the logs contain information that establishes where within the application server the event occurred. The data in the log file should establish the component, module, session identifier, filename, host name, and functionality within the application server where an event occurred.

If the application server does not log where within the application server the event took place, this is a finding.
Fix Text (F-39717r2_fix)
Configure the application server logging system to log where the event took place.