Central Log Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +30
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 30
- V-100015 Medium The Central Log Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
- V-100017 Medium The Central Log Server must provide a logout capability for user initiated communication session.
- V-100019 Low The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- V-100021 Low The Central Log Server must notify system administrators and ISSO when accounts are created.
- V-100025 Medium The Central Log Server must automatically audit account creation.
- V-100027 Medium The Central Log Server must automatically audit account modification.
- V-100029 Medium The Central Log Server must automatically audit account disabling actions.
- V-100031 Medium The Central Log Server must automatically audit account removal actions.
- V-100033 Medium The Central Log Server must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- V-100035 Medium The Central Log Server must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- V-100037 Low The Central Log Server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- V-100039 Low The Central Log Server must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-100041 Medium The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
- V-100043 Low The Central Log Server must initiate session auditing upon startup.
- V-100045 Low The Central Log Server must produce audit records containing information to establish what type of events occurred.
- V-100047 Low The Central Log Server must produce audit records containing information to establish when (date and time) the events occurred.
- V-100049 Low The Central Log Server must produce audit records containing information to establish where the events occurred.
- V-100051 Low The Central Log Server must produce audit records containing information to establish the source of the events.
- V-100053 Low The Central Log Server must produce audit records that contain information to establish the outcome of the events.
- V-100055 Low The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-100057 Medium The Central Log Server must protect audit information from any type of unauthorized read access.
- V-100059 Medium The Central Log Server must protect audit information from unauthorized modification.
- V-100061 Medium The Central Log Server must protect audit information from unauthorized deletion.
- V-100063 Medium The Central Log Server must protect audit tools from unauthorized access.
- V-100065 Medium The Central Log Server must protect audit tools from unauthorized modification.
- V-100067 Medium The Central Log Server must protect audit tools from unauthorized deletion.
- V-100069 Medium The Central Log Server must be configured to disable non-essential capabilities.
- V-100071 Low The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-100073 High The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
- V-100075 Medium The Central Log Server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-AU-000010
- Vuln IDs
-
- V-81105
- Rule IDs
-
- SV-95819r1_rule
Checks: C-80759r1_chk
Examine the configuration. Verify the system is configured with a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Verify the Central Log Server is configured to log all changes to the machine data. If the Central Log Server is not configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-87877r1_fix
Configure the Central Log Server to use a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Configure the Central Log Server to not allow alterations to the machine data.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000020
- Vuln IDs
-
- V-81107
- Rule IDs
-
- SV-95821r1_rule
Checks: C-80761r1_chk
Examine the documentation that lists the scope of coverage for the specific log server being reviewed. Verify the system is configured to aggregate log records from organization-defined devices and hosts within its scope of coverage. If the Central Log Server is not configured to aggregate log records from organization-defined devices and hosts within its scope of coverage, this is a finding.
Fix: F-87879r1_fix
For each log server, configure the server to aggregate log records from organization-defined devices and hosts within its scope of coverage.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000030
- Vuln IDs
-
- V-81109
- Rule IDs
-
- SV-95823r1_rule
Checks: C-80763r1_chk
Examine the time stamp that indicates when the Central Log Server received the log records. Verify the time is synchronized to within one second of the host server. If an NTP client is configured within the Central Log Server application, verify it is configured to use the same NTP time source as the host and devices within its scope of coverage. If time stamps recorded on the log records in the Central Log Server are not configured to synchronize to within one second of the host server or the log server application is not configured to use the same NTP time source as the host and devices within its scope of coverage, this is a finding.
Fix: F-87881r1_fix
Configure the Central Log Server such that time stamps on the log records are synchronized to within one second of the host server. If applicable, configure the Central Log Server NTP client to use the same NTP time source as the host and devices within its scope of coverage.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000390
- Vuln IDs
-
- V-81111
- Rule IDs
-
- SV-95825r1_rule
Checks: C-80765r1_chk
Examine the network architecture and documentation. If the log server being reviewed is one of multiple log servers in the enclave or on a network segment, verify that an aggregation server exists and that the log server under review is configured to send records received from the host and devices to the aggregation server or centralized SIEM/events sever. Where multiple log servers are installed in the enclave, if each log server is not configured to send log records to a central aggregation server or other consolidated events repository, this is a finding.
Fix: F-87883r1_fix
Where multiple log servers are installed in the enclave, configure each log server to forward logs to a consolidated aggregation server.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001353
- Version
- SRG-APP-000088-AU-000040
- Vuln IDs
-
- V-81113
- Rule IDs
-
- SV-95827r1_rule
Checks: C-80767r1_chk
Examine the configuration. Verify log records are configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by a typical analysis tools. If the Central Log Server log records are not configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools, this is a finding.
Fix: F-87885r1_fix
Configure the Central Log Server log records to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AU-000400
- Vuln IDs
-
- V-81115
- Rule IDs
-
- SV-95829r1_rule
Checks: C-80769r1_chk
Examine the configuration. Verify the Central Log Server retains the DoD-defined attributes of the log records sent by the devices and hosts. If the Central Log Server is not configured to retain the DoD-defined attributes of the log records sent by the devices and hosts, this is a finding.
Fix: F-87887r1_fix
Configure the Central Log Server to retain the DoD-defined attributes of the log records sent by the devices and hosts.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000171
- Version
- SRG-APP-000090-AU-000070
- Vuln IDs
-
- V-81117
- Rule IDs
-
- SV-95831r1_rule
Checks: C-80771r1_chk
Examine the configuration. Verify the system is configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained. If the Central Log Server is not configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained, this is a finding.
Fix: F-87889r1_fix
Configure the Central Log Server to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
- RMF Control
- AU-6
- Severity
- L
- CCI
- CCI-000154
- Version
- SRG-APP-000111-AU-000150
- Vuln IDs
-
- V-81119
- Rule IDs
-
- SV-95833r1_rule
Checks: C-80775r1_chk
Examine the configuration. Verify the system is configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals. If the Central Log Server is not configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals, this is a finding.
Fix: F-87891r1_fix
Configure the Central Log Server to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-000158
- Version
- SRG-APP-000115-AU-000160
- Vuln IDs
-
- V-81121
- Rule IDs
-
- SV-95835r1_rule
Checks: C-80777r1_chk
Examine the configuration. Verify the system is configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria. If the Central Log Server is not configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria, this is a finding.
Fix: F-87893r1_fix
Configure the Central Log Server to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AU-000270
- Vuln IDs
-
- V-81123
- Rule IDs
-
- SV-95837r1_rule
Checks: C-80779r1_chk
Examine the configuration. Verify the Central Log Server uses internal system clocks to generate time stamps for log records. If the Central Log Server is not configured to use internal system clocks to generate time stamps for log records, this is a finding.
Fix: F-87895r1_fix
Configure the Central Log Server to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AU-000300
- Vuln IDs
-
- V-81125
- Rule IDs
-
- SV-95839r1_rule
Checks: C-80783r1_chk
Examine the configuration. Verify the Central Log Server log records repository is backed up at least every seven days onto a different system or system component other than the system or component being audited. If the Central Log Server is not configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited, this is a finding.
Fix: F-87899r1_fix
Configure the Central Log Server to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AU-000310
- Vuln IDs
-
- V-81127
- Rule IDs
-
- SV-95841r1_rule
Checks: C-80785r1_chk
Examine the configuration. Verify the Central Log Server system is backed up to media capable of guaranteeing file integrity for a minimum of five years. If the Central Log Server system backups are not stored on appropriate media capable of guaranteeing file integrity for a minimum of five years, this is a finding.
Fix: F-87901r1_fix
Configure the Central Log Server system to back up to media capable of guaranteeing file integrity for a minimum of five years.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-AU-000200
- Vuln IDs
-
- V-81129
- Rule IDs
-
- SV-95843r1_rule
Checks: C-80787r1_chk
Examine the configuration. Verify the system is configured to perform audit reduction that supports on-demand reporting requirements. If the Central Log Server is not configured to perform audit reduction that supports on-demand reporting requirements, this is a finding.
Fix: F-87903r1_fix
Configure the Central Log Server to perform audit reduction that supports on-demand reporting requirements.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001684
- Version
- SRG-APP-000292-AU-000420
- Vuln IDs
-
- V-81131
- Rule IDs
-
- SV-95845r1_rule
Checks: C-80789r1_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage, this is a finding.
Fix: F-87905r1_fix
Configure the Central Log Server to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001685
- Version
- SRG-APP-000293-AU-000430
- Vuln IDs
-
- V-81133
- Rule IDs
-
- SV-95847r1_rule
Checks: C-80791r1_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account disabling actions are received, this is a finding.
Fix: F-87907r1_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001686
- Version
- SRG-APP-000294-AU-000440
- Vuln IDs
-
- V-81135
- Rule IDs
-
- SV-95849r1_rule
Checks: C-80793r1_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account removal actions are received, this is a finding.
Fix: F-87909r1_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- SRG-APP-000353-AU-000050
- Vuln IDs
-
- V-81137
- Rule IDs
-
- SV-95851r1_rule
Checks: C-80795r1_chk
Examine the configuration. Verify the SA and ISSM have been assigned the privileges needed to allow these roles to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Verify the retention configuration for each host and device is in compliance with the documented organization criteria, including the identified criticality level, event type, and/or retention period. If the Central Log Server is not configured to allow the SA and ISSM to change the retention of the log records, this is a finding. If the retention is not in compliance with the organization’s documentation, this is a finding.
Fix: F-87911r1_fix
Configure the Central Log Server with the privileges needed to allow the SA and ISSM to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Based on the documented requirements for each application, configure the events server to retain log records based on criticality level, type of event, and/or retention period, at a minimum.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- SRG-APP-000353-AU-000060
- Vuln IDs
-
- V-81139
- Rule IDs
-
- SV-95853r1_rule
Checks: C-80799r1_chk
Examine the configuration. Verify the system is configured so changes made to the level and type of log records stored in the centralized repository take effect immediately without the need to reboot or restart the application. If the Central Log Server is not configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application, this is a finding.
Fix: F-87913r1_fix
Configure the Central Log Server so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001919
- Version
- SRG-APP-000354-AU-000080
- Vuln IDs
-
- V-81141
- Rule IDs
-
- SV-95855r1_rule
Checks: C-80801r1_chk
Examine the configuration. Verify the system is configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users. If the Central Log Server is not configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users, this is a finding.
Fix: F-87915r1_fix
Configure the Central Log Server to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001844
- Version
- SRG-APP-000356-AU-000090
- Vuln IDs
-
- V-81143
- Rule IDs
-
- SV-95857r1_rule
Checks: C-80803r1_chk
Examine the configuration. Verify that centralized management of the events repository is enabled and configured for all hosts and devices within the scope of coverage. If the Central Log Server is not enabled to allow centralized management of the events repository for the purposes of configuration, analysis, and reporting, this is a finding.
Fix: F-87917r1_fix
Configure access for management tools used by administrators at management workstations, particularly those used for remote access. This often uses user access profiles or remote access configuration to enable secure and authorized access to the Central Log Server. Enable management from one or more management workstations or a secure browser. Verify remote communications from the management station using a secure, approved version of the protocol (e.g., TLS). Limit access based on user role, location, or remote device wherever possible.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AU-000100
- Vuln IDs
-
- V-81145
- Rule IDs
-
- SV-95859r1_rule
Checks: C-80807r1_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load log records onto a different system or media than the system being audited. If the Central Log Server is not configured to off-load log records onto a different system or media than the system being audited, this is a finding.
Fix: F-87921r1_fix
Configure the Central Log Server to off-load log records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- SRG-APP-000359-AU-000120
- Vuln IDs
-
- V-81147
- Rule IDs
-
- SV-95861r1_rule
Checks: C-80809r1_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to send an immediate warning to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of the repository's maximum log record storage capacity. If the Central Log Server is not configured to send an immediate alert to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity, this is a finding.
Fix: F-87923r1_fix
Configure the Central Log Server to send an immediate alert to the SA, ISSO, and other authorized personnel when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- SRG-APP-000360-AU-000130
- Vuln IDs
-
- V-81149
- Rule IDs
-
- SV-95863r1_rule
Checks: C-80811r1_chk
Examine the configuration. Verify the system is configured to send an alert to the SA and ISSO, within seconds or less, when communication is lost with any host or device within the scope of coverage that may indicate an audit failure. Verify the system is configured to send an alert if hosts and devices stop sending log records to the Central Log Server. If the Central Log Server is not configured to send a real-time alert to the SA and ISSO (at a minimum) of all audit failure events, this is a finding.
Fix: F-87925r1_fix
For the host and devices within its scope of coverage, configure the Central Log Server to send an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events such as loss of communications with hosts and devices, or if log records are no longer being received.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001861
- Version
- SRG-APP-000361-AU-000140
- Vuln IDs
-
- V-81151
- Rule IDs
-
- SV-95865r1_rule
Checks: C-80813r1_chk
Examine the configuration. Verify the system is configured to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost. If the Central Log Server is not configured to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost, this is a finding.
Fix: F-87927r1_fix
Configure the Central Log Server to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001886
- Version
- SRG-APP-000362-AU-000170
- Vuln IDs
-
- V-81153
- Rule IDs
-
- SV-95867r1_rule
Checks: C-80815r1_chk
Examine the configuration. Verify the system is configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-87929r1_fix
Configure the Central Log Server to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001887
- Version
- SRG-APP-000363-AU-000180
- Vuln IDs
-
- V-81155
- Rule IDs
-
- SV-95869r1_rule
Checks: C-80817r1_chk
Examine the configuration. Verify the Central Log Server performs on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-87969r1_fix
Configure the Central Log Server to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-AU-000190
- Vuln IDs
-
- V-81157
- Rule IDs
-
- SV-95871r1_rule
Checks: C-80819r1_chk
Examine the configuration. Verify the system performs audit reduction that supports on-demand audit review and analysis. If the Central Log Server is not configured to perform audit reduction that supports on-demand audit review and analysis, this is a finding.
Fix: F-87931r1_fix
Configure the Central Log Server to perform audit reduction that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001877
- Version
- SRG-APP-000365-AU-000210
- Vuln IDs
-
- V-81159
- Rule IDs
-
- SV-95873r1_rule
Checks: C-80821r1_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that supports after-the-fact investigations of security incidents. If the Central Log Server is not configured to perform audit reduction that supports after-the-fact investigations of security incidents, this is a finding.
Fix: F-87933r1_fix
Configure the Central Log Server to perform audit reduction that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001878
- Version
- SRG-APP-000366-AU-000220
- Vuln IDs
-
- V-81161
- Rule IDs
-
- SV-95875r1_rule
Checks: C-80823r1_chk
Examine the configuration. Verify the Central Log Server generates on-demand audit review and analysis reports. If the Central Log Server is not configured to generate on-demand audit review and analysis reports, this is a finding.
Fix: F-87935r1_fix
Configure the Central Log Server to generate on-demand audit review and analysis reports.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001879
- Version
- SRG-APP-000367-AU-000230
- Vuln IDs
-
- V-81163
- Rule IDs
-
- SV-95877r1_rule
Checks: C-80827r1_chk
Examine the configuration. Verify the Central Log Server generates reports that support on-demand reporting requirements. If the Central Log Server is not configured to generate reports that support on-demand reporting requirements, this is a finding.
Fix: F-87939r1_fix
Configure the Central Log Server to generate reports that support on-demand reporting requirements.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001880
- Version
- SRG-APP-000368-AU-000240
- Vuln IDs
-
- V-81165
- Rule IDs
-
- SV-95879r1_rule
Checks: C-80829r1_chk
Examine the configuration. Verify the Central Log Server generates reports that support after-the-fact investigations of security incidents. If the Central Log Server is not configured to generate reports that support after-the-fact investigations of security incidents, this is a finding.
Fix: F-87941r1_fix
Configure the Central Log Server to generate reports that support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001881
- Version
- SRG-APP-000369-AU-000250
- Vuln IDs
-
- V-81167
- Rule IDs
-
- SV-95881r1_rule
Checks: C-80831r1_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that does not alter original content or time ordering of log records. If the Central Log Server is not configured to perform audit reduction that does not alter original content or time ordering of log records, this is a finding.
Fix: F-87943r1_fix
Configure the Central Log Server to perform audit reduction that does not alter original content or time ordering of log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001882
- Version
- SRG-APP-000370-AU-000260
- Vuln IDs
-
- V-81169
- Rule IDs
-
- SV-95883r1_rule
Checks: C-80833r1_chk
Examine the configuration. Verify the Central Log Server generates reports that do not alter original content or time ordering of log records. If the Central Log Server is not configured to generate reports that do not alter original content or time ordering of log records, this is a finding.
Fix: F-87945r1_fix
Configure the Central Log Server to generate reports that do not alter original content or time ordering of log records.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AU-000290
- Vuln IDs
-
- V-81171
- Rule IDs
-
- SV-95885r1_rule
Checks: C-80835r1_chk
Examine the log records stored on the events server. Verify the Central Log Server records time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC. If the Central Log Server is not configured to record time stamps of the time the record was received or the time stamp is not mapped to UTC, this is a finding.
Fix: F-87947r1_fix
Configure the Central Log Server to record time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AU-000280
- Vuln IDs
-
- V-81173
- Rule IDs
-
- SV-95887r1_rule
Checks: C-80837r1_chk
Examine the configuration. Verify the Central Log Server records time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision. If the Central Log Server is not configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-87949r1_fix
Configure the Central Log Server to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001851
- Version
- SRG-APP-000515-AU-000110
- Vuln IDs
-
- V-81177
- Rule IDs
-
- SV-95891r1_rule
Checks: C-80841r1_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum. If the Central Log Server is not configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum, this is a finding.
Fix: F-87953r1_fix
Configure the Central Log Server to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000330
- Vuln IDs
-
- V-81179
- Rule IDs
-
- SV-95893r1_rule
Checks: C-80845r1_chk
Examine the configuration. Verify the Central Log Server is configured to include the identity of the original source host or device where the event occurred as part of each aggregated log record. If the Central Log Server is not configured to include the identity of the original source host or device where the event occurred as part of the aggregated log record, this is a finding.
Fix: F-87955r1_fix
Configure the Central Log Server to include the identity of the original source host or device as part of each aggregated log record.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000340
- Vuln IDs
-
- V-81181
- Rule IDs
-
- SV-95895r2_rule
Checks: C-80847r2_chk
Examine the configuration. Verify the Central Log Server is configured to use TCP. If the Central Log Server is not configured to use TCP, this is a finding.
Fix: F-87957r2_fix
Configure the Central Log Server that aggregates log records from hosts and devices to use TCP for transmission.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000350
- Vuln IDs
-
- V-81183
- Rule IDs
-
- SV-95897r1_rule
Checks: C-80849r1_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog, SIEM) does not perform analysis. This is NA if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage, this is a finding.
Fix: F-87959r1_fix
Configure the Central Log Server to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000360
- Vuln IDs
-
- V-81185
- Rule IDs
-
- SV-95899r1_rule
Checks: C-80851r1_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog) does not perform analysis. Examine the configuration. Verify the Central Log Server automatically creates trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds). If the Central Log Server is not configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds), this is a finding.
Fix: F-87961r1_fix
Configure the Central Log Server to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000370
- Vuln IDs
-
- V-81187
- Rule IDs
-
- SV-95901r1_rule
Checks: C-80853r1_chk
Examine the configuration. Verify the Central Log Server automatically aggregates events that indicate account actions for each device and host within its scope of coverage. If the Central Log Server is not configured to automatically aggregate events that indicate account actions for each device and host within its scope of coverage, this is a finding.
Fix: F-87963r1_fix
Configure the Central Log Server to automatically aggregate events that indicate account actions for each device and host within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000380
- Vuln IDs
-
- V-81189
- Rule IDs
-
- SV-95903r2_rule
Checks: C-80857r2_chk
Obtain the site’s SSP to see which criticality levels are used for each system within the scope of the Central Log Server. Examine the configuration of the Central Log Server. Verify the Central Log Server is configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts. If the Central Log Server is not configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts, this is a finding.
Fix: F-87965r1_fix
Configure the Central Log Server with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000410
- Vuln IDs
-
- V-81191
- Rule IDs
-
- SV-95905r1_rule
Checks: C-80859r1_chk
Examine the configuration. Verify analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are configured to comply with DoD-trusted path and access requirements. If analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are not configured to comply with DoD-trusted path and access requirements, this is a finding.
Fix: F-87967r1_fix
Configure all analysis, viewing, and indexing functions, services, and applications used with the Central Log Server to comply with DoD-trusted path and access requirements.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AU-002270
- Vuln IDs
-
- V-81281
- Rule IDs
-
- SV-95995r1_rule
Checks: C-80981r1_chk
Examine the configuration. Verify that individual user accounts are defined within the application. Each account must have a separate identifier. If an authentication server may be used for login, ensure the application audit logs containing management and configuration actions, identify the individual performing each action. If the Central Log Server is not configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-88063r1_fix
For systems where individual users access, configure and/or manage the system, configure the Central Log Server application so each user is explicitly identified and authenticated. While an authentication server, is often used for logon, this requirement must include instructions for integrating the authentication server so that they system requires unique identification and authentication. Note: Group accounts are not permitted for logon to the Central Log Server.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- SRG-APP-000171-AU-002540
- Vuln IDs
-
- V-81283
- Rule IDs
-
- SV-95997r1_rule
Checks: C-80983r1_chk
Examine the configuration. Verify the Central Log Server is configured to store only cryptographic representations of passwords. If the Central Log Server is not configured to store only cryptographic representations of passwords, this is a finding.
Fix: F-88065r1_fix
Configure the Central Log Server to store only cryptographic representations of passwords.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AU-002550
- Vuln IDs
-
- V-81285
- Rule IDs
-
- SV-95999r1_rule
Checks: C-80985r1_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process. If the Central Log Server is not configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process, this is a finding.
Fix: F-88067r1_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AU-002630
- Vuln IDs
-
- V-81287
- Rule IDs
-
- SV-96001r1_rule
Checks: C-80987r1_chk
Examine the configuration. Verify the Central Log Server is configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If the Central Log Server is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor, this is a finding.
Fix: F-88069r1_fix
Configure the Central Log Server to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AU-002640
- Vuln IDs
-
- V-81289
- Rule IDs
-
- SV-96003r1_rule
Checks: C-80989r1_chk
If not using PKI-based authentication this is NA. Examine the configuration. Verify the Central Log Server is configured to enforce authorized access to the corresponding private key when using PKI-based authentication. If the Central Log Server is not configured to enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-88071r1_fix
If using PKI-based authentication, configure the Central Log Server to enforce authorized access to the corresponding private key.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-AU-002660
- Vuln IDs
-
- V-81291
- Rule IDs
-
- SV-96005r1_rule
Checks: C-80993r1_chk
Examine the configuration. Verify the Central Log Server is configured to obfuscate authentication information during the authentication process so that the authentication is not visible. If the Central Log Server is not configured to obfuscate authentication information during the authentication process so that the authentication is not visible, this is a finding.
Fix: F-88073r1_fix
Configure the Central Log Server to obfuscate authentication information during the authentication process so that the authentication is not visible to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-AU-002670
- Vuln IDs
-
- V-81295
- Rule IDs
-
- SV-96009r1_rule
Checks: C-80995r1_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-88077r1_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-AU-001610
- Vuln IDs
-
- V-81297
- Rule IDs
-
- SV-96011r1_rule
Checks: C-80999r1_chk
Verify the Central Log Server user accounts are configured for granular permissions to separate and control access levels of accounts used to access the application. Users should not have access permissions that are not relevant to their role. If the Central Log Server is not configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies, this is a finding.
Fix: F-88081r1_fix
Configure the Central Log Server with granular permissions to separate and control access levels of accounts used to access the application.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AU-004310
- Vuln IDs
-
- V-81301
- Rule IDs
-
- SV-96015r1_rule
Checks: C-81001r1_chk
Examine the configuration. Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function. If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.
Fix: F-88083r1_fix
Configure the Central Log Server to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AU-002890
- Vuln IDs
-
- V-81303
- Rule IDs
-
- SV-96017r1_rule
Checks: C-81005r1_chk
Examine the configuration. Verify the Central Log Server is configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If the Central Log Server is not configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-88085r1_fix
Configure the Central Log Server to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AU-002280
- Vuln IDs
-
- V-81307
- Rule IDs
-
- SV-96021r1_rule
Checks: C-81007r3_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all privileged accounts. If the account of last resort is used for logon via the network (not recommended), then verify it is configured to require multifactor authentication method. If the Central Log Server is not configured to use multifactor authentication for network access to privileged user accounts, this is a finding.
Fix: F-88089r1_fix
This requirement applies to all privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log server application to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server. If the account of last resort is used for logon via the network (not recommended), then configure the account to require multifactor authentication method.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-AU-002320
- Vuln IDs
-
- V-81309
- Rule IDs
-
- SV-96023r1_rule
Checks: C-81011r2_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts. If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.
Fix: F-88091r1_fix
This requirement applies to all non-privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-AU-002330
- Vuln IDs
-
- V-81313
- Rule IDs
-
- SV-96027r1_rule
Checks: C-81013r4_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for local logon. If the Central Log Server is not configured to use multifactor authentication for local access using privileged accounts, this is a finding.
Fix: F-88095r1_fix
This requirement applies to all privileged user accounts used for local logon to the application. For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for local logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001936
- Version
- SRG-APP-000154-AU-002360
- Vuln IDs
-
- V-81315
- Rule IDs
-
- SV-96029r1_rule
Checks: C-81015r1_chk
Examine the configuration. Verify the Central Log Server is configured to use DoD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the Central Log Server is not configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-88097r1_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use DoD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-AU-002380
- Vuln IDs
-
- V-81317
- Rule IDs
-
- SV-96031r1_rule
Checks: C-81017r1_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. If the Central Log Server does not use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-88099r1_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-AU-002470
- Vuln IDs
-
- V-81319
- Rule IDs
-
- SV-96033r1_rule
Checks: C-81021r1_chk
Examine the configuration. Verify the Central Log Server is configured to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity. If the Central Log Server does not disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity, this is a finding.
Fix: F-88101r1_fix
For local accounts (except for the account of last resort), configure the Central Log Server to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-AU-002480
- Vuln IDs
-
- V-81321
- Rule IDs
-
- SV-96035r1_rule
Checks: C-81023r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a minimum 15-character password length. If the Central Log Server is not configured to enforce a minimum 15-character password length, this is a finding.
Fix: F-88105r1_fix
Configure the Central Log Server to enforce a minimum 15-character password length.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-AU-002290
- Vuln IDs
-
- V-81323
- Rule IDs
-
- SV-96037r1_rule
Checks: C-81025r3_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credential to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credential to support identity management and personal authentication, this is a finding.
Fix: F-88107r1_fix
Configure the Central Log Server to accept the DoD CAC credential to support identity management and personal authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-AU-002300
- Vuln IDs
-
- V-81327
- Rule IDs
-
- SV-96041r1_rule
Checks: C-81031r2_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credentials to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credentials to support identity management and personal authentication, this is a finding.
Fix: F-88111r1_fix
Configure the Central Log Server to accept the DoD CAC credentials to support identity management and personal authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-AU-002590
- Vuln IDs
-
- V-81331
- Rule IDs
-
- SV-96045r1_rule
Checks: C-81035r1_chk
Examine the configuration. Verify the Central Log Server is configured to allow the use of a temporary password for system logons with an immediate change to a permanent password. If the Central Log Server is not configured to allow the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-88115r1_fix
Configure the Central Log Server to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000200
- Version
- SRG-APP-000165-AU-002580
- Vuln IDs
-
- V-81335
- Rule IDs
-
- SV-96049r1_rule
Checks: C-81039r1_chk
Examine the configuration. Verify the Central Log Server is configured to prohibit password reuse for a minimum of five generations. If the Central Log Server is not configured to prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-88119r1_fix
Configure the Central Log Server to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000192
- Version
- SRG-APP-000166-AU-002490
- Vuln IDs
-
- V-81337
- Rule IDs
-
- SV-96051r1_rule
Checks: C-81043r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one upper-case character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one upper-case character be used, this is a finding.
Fix: F-88121r1_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000193
- Version
- SRG-APP-000167-AU-002500
- Vuln IDs
-
- V-81339
- Rule IDs
-
- SV-96053r1_rule
Checks: C-81045r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one lower-case character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one lower-case character be used, this is a finding.
Fix: F-88123r1_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000194
- Version
- SRG-APP-000168-AU-002510
- Vuln IDs
-
- V-81345
- Rule IDs
-
- SV-96059r1_rule
Checks: C-81053r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one numeric character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-88131r1_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-001619
- Version
- SRG-APP-000169-AU-002520
- Vuln IDs
-
- V-81349
- Rule IDs
-
- SV-96063r1_rule
Checks: C-81057r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one special character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-88135r1_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000195
- Version
- SRG-APP-000170-AU-002530
- Vuln IDs
-
- V-81353
- Rule IDs
-
- SV-96067r1_rule
Checks: C-81061r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring the change of at least 8 of the total number of characters when passwords are changed. If the Central Log Server is not configured to require the change of at least 8 of the total number of characters when passwords are changed, this is a finding.
Fix: F-88139r1_fix
Configure the Central Log Server to require the change of at least 8 of the total number of characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000198
- Version
- SRG-APP-000173-AU-002560
- Vuln IDs
-
- V-81355
- Rule IDs
-
- SV-96069r1_rule
Checks: C-81065r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce 24 hours/1 day as the minimum password lifetime. If the Central Log Server is not configured to enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-88141r1_fix
Configure the Central Log Server to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000199
- Version
- SRG-APP-000174-AU-002570
- Vuln IDs
-
- V-81359
- Rule IDs
-
- SV-96073r1_rule
Checks: C-81067r1_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a 60-day maximum password lifetime restriction. If the Central Log Server is not configured to enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-88145r1_fix
Configure the Central Log Server to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AU-002650
- Vuln IDs
-
- V-81363
- Rule IDs
-
- SV-96077r1_rule
Checks: C-81073r1_chk
Examine the configuration. Verify the Central Log Server is configured to map the authenticated identity to the individual user or group account for PKI-based authentication. If the Central Log Server is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-88149r1_fix
Configure the Central Log Server to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-AU-000190
- Vuln IDs
-
- V-100015
- Rule IDs
-
- SV-109119r1_rule
Checks: C-98865r1_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically terminate a user session after organization-defined conditions or trigger events. If the Central Log Server is not configured to automatically terminate a user session after organization-defined conditions or trigger events, this is a finding.
Fix: F-105699r1_fix
Configure the Central Log Server to automatically terminate a user session after organization-defined conditions or trigger events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-AU-000560
- Vuln IDs
-
- V-100017
- Rule IDs
-
- SV-109121r1_rule
Checks: C-98867r1_chk
Examine the configuration. Verify that the Central Log Server provides a logout capability for user initiated sessions. If the Central Log Server does not provide a logout capability for user initiated sessions, this is a finding.
Fix: F-105701r1_fix
Configure the Central Log Server to provide a logout capability for user initiated sessions.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002364
- Version
- SRG-APP-000297-AU-000570
- Vuln IDs
-
- V-100019
- Rule IDs
-
- SV-109123r1_rule
Checks: C-98869r1_chk
Examine the configuration. Verify that the Central Log Server is configured to display an explicit logout message to users indicating the reliable termination of authenticated sessions. If the Central Log Server is not configured to display an explicit logout message to users, it is a finding.
Fix: F-105703r1_fix
Configure the Central Log Server to display an explicit logout message to users indicating the reliable termination of authenticated sessions.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001683
- Version
- SRG-APP-000291-AU-000200
- Vuln IDs
-
- V-100021
- Rule IDs
-
- SV-109125r1_rule
Checks: C-98871r1_chk
Examine the configuration. Verify that the Central Log Server is configured to notify system administrators and the ISSO when accounts are created. If the Central Log Server is not configured to notify system administrators and ISSO when accounts are created, this is a finding.
Fix: F-105705r1_fix
Configure the Central Log Server to notify system administrators and the ISSO when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-AU-000580
- Vuln IDs
-
- V-100025
- Rule IDs
-
- SV-109129r1_rule
Checks: C-98875r1_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account creation. If the Central Log Server is not configured to automatically audit account creation, this is a finding.
Fix: F-105709r1_fix
Configure the Central Log Server to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-AU-000590
- Vuln IDs
-
- V-100027
- Rule IDs
-
- SV-109131r1_rule
Checks: C-98877r1_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account modification. If the Central Log Server is not configured to automatically audit account modification, this is a finding.
Fix: F-105711r1_fix
Configure the Central Log Server to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-AU-000600
- Vuln IDs
-
- V-100029
- Rule IDs
-
- SV-109133r1_rule
Checks: C-98879r1_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account disabling. If the Central Log Server is not configured to automatically audit account disabling, this is a finding.
Fix: F-105713r1_fix
Configure the Central Log Server to automatically audit account disabling.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-AU-000610
- Vuln IDs
-
- V-100031
- Rule IDs
-
- SV-109135r1_rule
Checks: C-98881r1_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account removal. If the Central Log Server is not configured to automatically audit account removal, this is a finding.
Fix: F-105715r1_fix
Configure the Central Log Server to automatically audit account removal.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-AU-000240
- Vuln IDs
-
- V-100033
- Rule IDs
-
- SV-109137r1_rule
Checks: C-98883r1_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account after 3 consecutive invalid attempts during a 15 minute period. If the Central Log Server is not configured to lock out the account after 3 consecutive invalid attempts in 15 minutes, this is a finding.
Fix: F-105717r1_fix
Configure the Central Log Server to lock out the account after 3 consecutive invalid attempts during a 15 minute period.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-AU-000400
- Vuln IDs
-
- V-100035
- Rule IDs
-
- SV-109139r1_rule
Checks: C-98885r1_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded. If the Central Log Server is not configured to lock out the account until released by an administrator when 3 consecutive invalid attempts in 15 minutes is exceeded, this is a finding.
Fix: F-105719r1_fix
Configure the Central Log Server to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SRG-APP-000068-AU-000035
- Vuln IDs
-
- V-100037
- Rule IDs
-
- SV-109141r1_rule
Checks: C-98887r1_chk
Examine the configuration. Verify that the Central Log Server is configured to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server. If the Central Log Server is not configured to display the Mandatory DoD Notice and Consent Banner, this is a finding.
Fix: F-105721r1_fix
Configure the Central Log Server to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- SRG-APP-000069-AU-000420
- Vuln IDs
-
- V-100039
- Rule IDs
-
- SV-109143r1_rule
Checks: C-98889r1_chk
Examine the configuration. Verify that the Central Log Server is configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions. If the Central Log Server is not configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions, this is a finding.
Fix: F-105723r1_fix
Configure the Central Log Server to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-AU-000280
- Vuln IDs
-
- V-100041
- Rule IDs
-
- SV-109145r1_rule
Checks: C-98891r1_chk
Examine the configuration. Verify that the Central Log Server generates audit records when successful/unsuccessful logon attempts occur. If the Central Log Server is not configured to generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-105725r1_fix
Configure the Central Log Server to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001464
- Version
- SRG-APP-000092-AU-000670
- Vuln IDs
-
- V-100043
- Rule IDs
-
- SV-109147r1_rule
Checks: C-98893r1_chk
Examine the configuration. Verify that the Central Log Server initiates session logging upon startup. If the Central Log Server is not configured to initiate session logging upon startup, this is a finding.
Fix: F-105727r1_fix
Configure the Central Log Server to initiate session logging upon startup.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AU-000680
- Vuln IDs
-
- V-100045
- Rule IDs
-
- SV-109149r1_rule
Checks: C-98895r1_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish what type of events occurred. If the Central Log Server is not configured to produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-105729r1_fix
Configure the Central Log Server to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AU-000690
- Vuln IDs
-
- V-100047
- Rule IDs
-
- SV-109151r1_rule
Checks: C-98897r1_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish when the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-105731r1_fix
Configure the Central Log Server to produce audit records containing information to establish when the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AU-000700
- Vuln IDs
-
- V-100049
- Rule IDs
-
- SV-109153r1_rule
Checks: C-98899r1_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish where the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-105733r1_fix
Configure the Central Log Server to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AU-000710
- Vuln IDs
-
- V-100051
- Rule IDs
-
- SV-109155r1_rule
Checks: C-98901r1_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the source of the events. If the Central Log Server is not configured to produce audit records containing information to establish the source of the events, this is a finding.
Fix: F-105735r1_fix
Configure the Central Log Server to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AU-000720
- Vuln IDs
-
- V-100053
- Rule IDs
-
- SV-109157r1_rule
Checks: C-98903r1_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the outcome of the events. If the Central Log Server is not configured to produce audit records containing information to establish the outcome of the events, this is a finding.
Fix: F-105737r1_fix
Configure the Central Log Server to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AU-000730
- Vuln IDs
-
- V-100055
- Rule IDs
-
- SV-109159r1_rule
Checks: C-98905r1_chk
The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
Fix: F-105739r1_fix
Configure the Central Log Server to produce audit records containing information to establish the identity of the individual or process associated with the event.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-AU-000100
- Vuln IDs
-
- V-100057
- Rule IDs
-
- SV-109161r1_rule
Checks: C-98907r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized read access. If the Central Log Server is not configured to protect audit information from any unauthorized read access, this is a finding.
Fix: F-105741r1_fix
Configure the Central Log Server to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-AU-000110
- Vuln IDs
-
- V-100059
- Rule IDs
-
- SV-109163r1_rule
Checks: C-98909r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized modification. If the Central Log Server is not configured to protect audit information from any unauthorized modification, this is a finding.
Fix: F-105743r1_fix
Configure the Central Log Server to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-AU-000120
- Vuln IDs
-
- V-100061
- Rule IDs
-
- SV-109165r1_rule
Checks: C-98911r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from unauthorized deletion. If the Central Log Server is not configured to protect audit information from unauthorized deletion, this is a finding.
Fix: F-105745r1_fix
Configure the Central Log Server to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-AU-000130
- Vuln IDs
-
- V-100063
- Rule IDs
-
- SV-109167r1_rule
Checks: C-98913r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized access. If the Central Log Server is not configured to protect audit tools from unauthorized access, this is a finding.
Fix: F-105747r1_fix
Configure the Central Log Server to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-AU-000140
- Vuln IDs
-
- V-100065
- Rule IDs
-
- SV-109169r1_rule
Checks: C-98915r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized modification. If the Central Log Server is not configured to protect audit tools from unauthorized modification, this is a finding.
Fix: F-105749r1_fix
Configure the Central Log Server to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-AU-000150
- Vuln IDs
-
- V-100067
- Rule IDs
-
- SV-109171r1_rule
Checks: C-98917r1_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized deletion. If the Central Log Server is not configured to protect audit tools from unauthorized deletion, this is a finding.
Fix: F-105751r1_fix
Configure the Central Log Server to protect audit tools from unauthorized deletion.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AU-000090
- Vuln IDs
-
- V-100069
- Rule IDs
-
- SV-109173r1_rule
Checks: C-98919r1_chk
Examine the configuration. Verify that the Central Log Server is configured to disable non-essential capabilities. If the Central Log Server is not configured to disable non-essential capabilities, this is a finding.
Fix: F-105753r1_fix
Configure the Central Log Server to disable non-essential capabilities.
- RMF Control
- IA-11
- Severity
- L
- CCI
- CCI-002038
- Version
- SRG-APP-000389-AU-000180
- Vuln IDs
-
- V-100071
- Rule IDs
-
- SV-109175r1_rule
Checks: C-98923r1_chk
Examine the configuration. Verify the Central Log Server requires users to reauthenticate when situations require reauthentication. If the Central Log Server is not configured to reauthenticate when necessary, this is a finding.
Fix: F-105757r1_fix
Configure the Central Log Server to reauthenticate users when situations require reauthentication.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000610-AU-000050
- Vuln IDs
-
- V-100073
- Rule IDs
-
- SV-109177r1_rule
Checks: C-98925r1_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-105759r1_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-AU-000040
- Vuln IDs
-
- V-100075
- Rule IDs
-
- SV-109179r1_rule
Checks: C-98927r1_chk
Examine the configuration. Verify the Central Log Server is configured to only allow the use of DoD PKI certificate authorities. If the Central Log Server is not configured to only allow DoD PKI certificate authorities, this is a finding.
Fix: F-105761r1_fix
Configure the Central Log Server to only allow the use of DoD PKI certificate authorities.