Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-60789 | GSAP-00-000660 | SV-75241r1_rule | Medium |
Description |
---|
The need to verify security functionality applies to all security functions. For those security functions not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include startup, restart, shutdown, and abort. |
STIG | Date |
---|---|
Google Search Appliance Security Technical Implementation Guide | 2015-07-07 |
Check Text ( C-61713r1_chk ) |
---|
Open the GSA Web Admin Console at https: Login to the GSA management interface. Navigate to "Administration", select "Network Settings". Ensure that a valid Syslog server is entered correctly. If events are sent and recorded on the Syslog server, this is not a finding. |
Fix Text (F-66471r1_fix) |
---|
Open the GSA Web Admin Console at https: Login to the GSA management interface. Navigate to "Administration", select "Network Settings". Enter a valid Syslog server. Ensure that events are sent and recorded on the Syslog server. |