Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-81119 | SRG-APP-000111-AU-000150 | SV-95833r1_rule | Low |
Description |
---|
Successful incident response and auditing relies on timely, accurate system information and analysis to allow the organization to identify and respond to potential incidents in a proficient manner. If the application does not provide the ability to centrally review the application logs, forensic analysis is negatively impacted. Segregation of logging data to multiple disparate computer systems is counterproductive and makes log analysis and event notification difficult to implement and manage, particularly when the system or application has multiple logging components written to different locations or systems. Automated mechanisms for centralized reviews and analyses include, for example, Security Information and Event Management (SIEM) products. |
STIG | Date |
---|---|
Central Log Server Security Requirements Guide | 2019-06-28 |
Check Text ( C-80775r1_chk ) |
---|
Examine the configuration. Verify the system is configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals. If the Central Log Server is not configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals, this is a finding. |
Fix Text (F-87891r1_fix) |
---|
Configure the Central Log Server to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals. |