Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-81189 | SRG-APP-000516-AU-000380 | SV-95903r2_rule | Medium |
Description |
---|
This supports prioritization functions, which is a major reason why centralized management is a requirement in DoD. This includes different features that help highlight the important events over less critical security events. This may be accomplished by correlating security events with vulnerability data or other asset information. Prioritization algorithms often use severity information provided by the original log source as well. The criticality levels used by the site and the actions that are taken based on the levels established for each system are documented in the SSP. These levels and actions can only be leveraged for alerts, notifications, and reports which correlate asset information if they are configured in the Central Log Server. |
STIG | Date |
---|---|
Central Log Server Security Requirements Guide | 2019-06-28 |
Check Text ( C-80857r2_chk ) |
---|
Obtain the site’s SSP to see which criticality levels are used for each system within the scope of the Central Log Server. Examine the configuration of the Central Log Server. Verify the Central Log Server is configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts. If the Central Log Server is not configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts, this is a finding. |
Fix Text (F-87965r1_fix) |
---|
Configure the Central Log Server with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts. |