Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-68183 | SRG-APP-000353-MFP-000112 | SV-82673r1_rule | Medium |
Description |
---|
If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost. This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real-time, within minutes, or within hours. |
STIG | Date |
---|---|
Mainframe Product Security Requirements Guide | 2019-12-12 |
Check Text ( C-68745r1_chk ) |
---|
Examine the installation and configuration settings. If system programmers do not have the capability to change auditing settings in accordance with applicable access control policies, this is a finding. If an external security manager (ESM) is used, check the ESM rules and configuration. If there are no rules for these resources or the rules do not allow update and above access to system programmers in accordance with applicable access control policies, this is a finding. |
Fix Text (F-74299r1_fix) |
---|
Configure the Mainframe Product to allow system programmers the capability to change auditing settings. This can be accomplished by using the ESM. Configure the ESM to allow update and above access to system programmers. |