UCF STIG Viewer Logo

The vAMI must enable logging.


Overview

Finding ID Version Rule ID IA Controls Severity
V-90265 VRAU-VA-000615 SV-100915r1_rule Medium
Description
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Privileged activities would occur through the management interface. This interface can be web-based or can be command line utilities. Whichever method is used by the application server, these activities must be logged.
STIG Date
VMW vRealize Automation 7.x vAMI Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-89957r1_chk )
At the command prompt, execute the following command:

grep traceLevel /opt/vmware/etc/sfcb/sfcb.cfg

If the value of "traceLevel" is not "1", this is a finding.
Fix Text (F-97007r1_fix)
Navigate to and open /opt/vmware/etc/sfcb/sfcb.cfg.

Configure the sfcb.cfg file with the following value: 'traceLevel: 1'