UCF STIG Viewer Logo

The Google Search Appliances must respond to security function anomalies by notifying the system administrator.


Overview

Finding ID Version Rule ID IA Controls Severity
V-60789 GSAP-00-000660 SV-75241r1_rule Medium
Description
The need to verify security functionality applies to all security functions. For those security functions not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include startup, restart, shutdown, and abort.
STIG Date
Google Search Appliance Security Technical Implementation Guide 2015-07-07

Details

Check Text ( C-61713r1_chk )
Open the GSA Web Admin Console at https::8443.

Login to the GSA management interface.

Navigate to "Administration", select "Network Settings".

Ensure that a valid Syslog server is entered correctly.

If events are sent and recorded on the Syslog server, this is not a finding.
Fix Text (F-66471r1_fix)
Open the GSA Web Admin Console at https::8443.

Login to the GSA management interface.

Navigate to "Administration", select "Network Settings".

Enter a valid Syslog server.

Ensure that events are sent and recorded on the Syslog server.