UCF STIG Viewer Logo

The application server must generate log records when successful/unsuccessful logon attempts occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-204826 SRG-APP-000503-AS-000228 SV-204826r508029_rule Medium
Description
Logging the access to the application server allows the system administrators to monitor user accounts. By logging successful/unsuccessful logons, the system administrator can determine if an account is compromised (e.g., frequent logons) or is in the process of being compromised (e.g., frequent failed logons) and can take actions to thwart the attack. Logging successful logons can also be used to determine accounts that are no longer in use.
STIG Date
Application Server Security Requirements Guide 2021-12-10

Details

Check Text ( C-4946r283119_chk )
Review product documentation and the system configuration to determine if the application server generates log records on successful and unsuccessful logon attempts by users.

If logon attempts do not generate log records, this is a finding.
Fix Text (F-4946r283120_fix)
Configure the application server to generate log records when successful/unsuccessful logon attempts are made by users.