Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-62083 | SRG-NET-000100-VVSM-00040 | SV-76573r1_rule | Medium |
Description |
---|
If session records were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity of session records, the information system and/or the application must protect session information from unauthorized modification. This requirement can be achieved through multiple methods, which will depend upon system architecture and design. Some commonly employed methods include ensuring log files receive the proper file system permissions, and limiting log data locations. |
STIG | Date |
---|---|
Voice Video Session Management Security Requirements Guide | 2017-04-06 |
Check Text ( C-62887r1_chk ) |
---|
Verify the Voice Video Session Manager protects session records from unauthorized deletion. If the Voice Video Session Manager does not protect session records from unauthorized deletion, this is a finding. |
Fix Text (F-68003r1_fix) |
---|
Configure the Voice Video Session Manager to protect session records from unauthorized deletion. |