UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The CA API Gateway must generate audit records containing information to establish the identity of any individual or process associated with the event.


Overview

Finding ID Version Rule ID IA Controls Severity
V-71335 CAGW-GW-000230 SV-85959r1_rule Medium
Description
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Associating information about where the event occurred within the network provides a means of investigating an attack, recognizing resource utilization or capacity thresholds, or identifying an improperly configured network element. The CA API Gateway must have the "Audit Messages in Policy" Assertion added to all policies.
STIG Date
CA API Gateway ALG Security Technical Implementation Guide 2017-04-07

Details

Check Text ( C-71735r1_chk )
Open the CA API Gateway - Policy Manager and verify all of the Registered Services have the "Audit Messages in Policy" Assertion added to the Service.

If any of the Registered Services do not have the "Audit Messages in Policy" Assertion added, this is a finding.
Fix Text (F-77645r1_fix)
Open the CA API Gateway - Policy Manager.

Open the Registered Services that do not have the "Audit Messages in Policy" Assertion and add it to the top of the Registered Services policies.