UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-100071 SRG-APP-000389-AU-000180 SV-109175r1_rule Low
Description
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the functional capability of the application, it is critical the user reauthenticate. In addition to the reauthentication requirements associated with session locks, organizations may require reauthentication of individuals and/or devices in other situations, including (but not limited to) the following circumstances. (i) When authenticators change; (ii) When roles change; (iii) When security categories of information systems change; (iv) When the execution of privileged functions occurs; (v) After a fixed period of time; or (vi) Periodically. Within the DoD, the minimum circumstances requiring reauthentication are privilege escalation and role changes.
STIG Date
Central Log Server Security Requirements Guide 2020-06-22

Details

Check Text ( C-98923r1_chk )
Examine the configuration.

Verify the Central Log Server requires users to reauthenticate when situations require reauthentication.

If the Central Log Server is not configured to reauthenticate when necessary, this is a finding.
Fix Text (F-105757r1_fix)
Configure the Central Log Server to reauthenticate users when situations require reauthentication.