UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must produce log records containing information to establish what type of events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-204721 SRG-APP-000095-AS-000056 SV-204721r508029_rule Medium
Description
Information system logging capability is critical for accurate forensic analysis. Without being able to establish what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible. Log record content that may be necessary to satisfy the requirement of this control includes time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked. Application servers must log all relevant log data that pertains to the application server. Examples of relevant data include, but are not limited to, Java Virtual Machine (JVM) activity, HTTPD/Web server activity, and application server-related system process activity.
STIG Date
Application Server Security Requirements Guide 2021-12-10

Details

Check Text ( C-4841r282810_chk )
Review the application server log configuration to determine if the application server produces log records showing what type of event occurred.

If the log data does not show the type of event, this is a finding.
Fix Text (F-4841r282811_fix)
Configure the application server to include the event type in the log data.