UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The web server must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.


Overview

Finding ID Version Rule ID IA Controls Severity
V-41620 SRG-APP-000100-WSR-000064 SV-54197r2_rule Medium
Description
Web server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Determining user accounts, processes running on behalf of the user, and running process identifiers also enable a better understanding of the overall event. User tool identification is also helpful to determine if events are related to overall user access or specific client tools. Log record content that may be necessary to satisfy the requirement of this control includes: time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-48049r2_chk )
Review the web server documentation and deployment configuration to determine if the web server can generate log data containing the user/subject identity.

Request a user access the hosted application and generate logable events, and verify the events contain the user/subject or process identity.

If the identity is not part of the log record, this is a finding.
Fix Text (F-47079r2_fix)
Configure the web server to include the user/subject identity or process as part of each log record.