UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must generate log records when successful/unsuccessful logon attempts occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-57443 SRG-APP-000503-AS-000228 SV-71715r2_rule Medium
Description
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an account is compromised (e.g., frequent logons) or is in the process of being compromised (e.g., frequent failed logons) and can take actions to thwart the attack. Logging successful logons can also be used to determine accounts that are no longer in use.
STIG Date
Application Server Security Requirements Guide 2018-09-13

Details

Check Text ( C-58119r1_chk )
Review product documentation and the system configuration to determine if the application server generates log records on successful and unsuccessful logon attempts by users.

If logon attempts do not generate log records, this is a finding.
Fix Text (F-62481r1_fix)
Configure the application server to generate log records when successful/unsuccessful logon attempts are made by users.