Central Log Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +101 −102
Comparison against the immediately-prior release (V1R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 101
- V-206447 High The Central Log Server must be configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- V-206448 Medium The Central Log Server must be configured to protect the data sent from hosts and devices from being altered in a way that may prevent the attribution of an action to an individual (or process acting on behalf of an individual).
- V-206449 Low The Central Log Server must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.
- V-206450 Low Time stamps recorded on the log records in the Central Log Server must be configured to synchronize to within one second of the host server or, if NTP is configured directly in the log server, the NTP time source must be the same as the host and devices within its scope of coverage.
- V-206451 Medium Where multiple log servers are installed in the enclave, each log server must be configured to aggregate log records to a central aggregation server or other consolidated events repository.
- V-206452 Low The Central Log Server log records must be configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools.
- V-206453 Medium The Central Log Server must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.
- V-206454 Low The Central Log Server must be configured to allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
- V-206455 Low The Central Log Server must be configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.
- V-206456 Low The Central Log Server must be configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.
- V-206457 Low The Central Log Server must be configured to use internal system clocks to generate time stamps for log records.
- V-206458 Low The Central Log Server must be configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.
- V-206459 Low The Central Log Server system backups must be retained for a minimum of 5 years for SAMLI and a minimum of 7 days for non-SAMI on media capable of guaranteeing file integrity for the minimum applicable information retention period.
- V-206460 High The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-206461 Medium The Central Log Server must use multifactor authentication for network access to privileged user accounts.
- V-206462 Medium The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.
- V-206463 Medium The Central Log Server must use multifactor authentication for local access using privileged user accounts.
- V-206464 Medium The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-206465 Medium The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- V-206466 Medium The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
- V-206467 Medium The Central Log Server must be configured to enforce a minimum 15-character password length.
- V-206468 Low The Central Log Server must be configured to prohibit password reuse for a minimum of five generations.
- V-206469 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one upper-case character be used.
- V-206470 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one lower-case character be used.
- V-206471 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one numeric character be used.
- V-206472 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.
- V-206473 Low The Central Log Server must be configured to require the change of at least 8 of the total number of characters when passwords are changed.
- V-206474 High For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.
- V-206475 High For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- V-206476 Low The Central Log Server must be configured to enforce 24 hours/1 day as the minimum password lifetime.
- V-206477 Low The Central Log Server must be configured to enforce a 60-day maximum password lifetime restriction.
- V-206478 High The Central Log Server, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-206479 High The Central Log Server, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
- V-206480 Low The Central Log Server must map the authenticated identity to the individual user or group account for PKI-based authentication.
- V-206481 High The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.
- V-206482 High The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- V-206483 Medium The Central Log Server must be configured to perform audit reduction that supports on-demand reporting requirements.
- V-206484 Low For devices and hosts within its scope of coverage, the Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO) when account modification events are received.
- V-206485 Low For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account disabling actions are received.
- V-206486 Low For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.
- V-206490 Low The Central Log Server must be configured for centralized management of the events repository for the purposes of configuration, analysis, and reporting.
- V-206491 Medium The Central Log Server must be configured to off-load log records onto a different system or media than the system being audited.
- V-206492 Low The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.
- V-206493 Low For the host and devices within its scope of coverage, the Central Log Server must be configured to send a real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) of all audit failure events, such as loss of communications with hosts and devices, or if log records are no longer being received.
- V-206494 Low The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) or Information System Security Officer (ISSO) if communication with the host and devices within its scope of coverage is lost.
- V-206495 Low The Central Log Server must be configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
- V-206496 Low The Central Log Server must be configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
- V-206497 Medium The Central Log Server must be configured to perform audit reduction that supports on-demand audit review and analysis.
- V-206498 Low The Central Log Server must be configured to perform audit reduction that supports after-the-fact investigations of security incidents.
- V-206499 Low The Central Log Server must be configured to generate on-demand audit review and analysis reports.
- V-206500 Low The Central Log Server must be configured to generate reports that support on-demand reporting requirements.
- V-206501 Low The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.
- V-206502 Low The Central Log Server must be configured to perform audit reduction that does not alter original content or time ordering of log records.
- V-206503 Low The Central Log Server must be configured to generate reports that do not alter original content or time ordering of log records.
- V-206504 Low Upon receipt of the log record from hosts and devices, the Central Log Server must be configured to record time stamps of the time of receipt that can be mapped to Coordinated Universal Time (UTC).
- V-206505 Low The Central Log Server must be configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.
- V-206506 Medium The Central Log Server must be configured to accept the DoD CAC credential to support identity management and personal authentication.
- V-206507 Medium The Central Log Server must be configured to electronically verify the DoD CAC credential.
- V-206508 Medium For locally created accounts in the application, the Central Log Server must be configured to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-206509 High The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.
- V-206510 High The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.
- V-206511 Low The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
- V-206512 Medium The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.
- V-206513 Medium The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.
- V-206514 Medium The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- V-206515 Medium The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
- V-206516 Medium For devices and hosts within the scope of coverage, the Central Log Server must be configured to automatically aggregate events that indicate account actions.
- V-206517 Medium The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
- V-206518 Medium Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.
- V-221900 Medium The Central Log Server must automatically audit account creation.
- V-221901 Medium The Central Log Server must automatically audit account modification.
- V-221902 Medium The Central Log Server must automatically audit account disabling actions.
- V-221903 Medium The Central Log Server must automatically audit account removal actions.
- V-221904 Medium The Central Log Server must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- V-221905 Low The Central Log Server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- V-221906 Low The Central Log Server must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-221907 Low The Central Log Server must initiate session auditing upon startup.
- V-221908 Low The Central Log Server must produce audit records containing information to establish what type of events occurred.
- V-221909 Low The Central Log Server must produce audit records containing information to establish when (date and time) the events occurred.
- V-221910 Low The Central Log Server must produce audit records containing information to establish where the events occurred.
- V-221911 Low The Central Log Server must produce audit records containing information to establish the source of the events.
- V-221912 Low The Central Log Server must produce audit records that contain information to establish the outcome of the events.
- V-221913 Low The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-221914 Medium The Central Log Server must protect audit information from any type of unauthorized read access.
- V-221915 Medium The Central Log Server must protect audit information from unauthorized modification.
- V-221916 Medium The Central Log Server must protect audit information from unauthorized deletion.
- V-221917 Medium The Central Log Server must protect audit tools from unauthorized access.
- V-221918 Medium The Central Log Server must protect audit tools from unauthorized modification.
- V-221919 Medium The Central Log Server must protect audit tools from unauthorized deletion.
- V-221920 Medium The Central Log Server must be configured to disable non-essential capabilities.
- V-221921 Low The Central Log Server must notify system administrators and ISSO when accounts are created.
- V-221922 Medium The Central Log Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
- V-221923 Medium The Central Log Server must provide a logout capability for user initiated communication session.
- V-221924 Low The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- V-221925 Medium The Central Log Server must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- V-221926 Low The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-221927 Medium The Central Log Server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.
- V-221928 Medium The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
- V-221929 High The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
- V-241819 Low The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.
- V-241820 Low The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
Removed rules 102
- V-100015 Medium The Central Log Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
- V-100017 Medium The Central Log Server must provide a logout capability for user initiated communication session.
- V-100019 Low The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- V-100021 Low The Central Log Server must notify system administrators and ISSO when accounts are created.
- V-100025 Medium The Central Log Server must automatically audit account creation.
- V-100027 Medium The Central Log Server must automatically audit account modification.
- V-100029 Medium The Central Log Server must automatically audit account disabling actions.
- V-100031 Medium The Central Log Server must automatically audit account removal actions.
- V-100033 Medium The Central Log Server must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.
- V-100035 Medium The Central Log Server must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
- V-100037 Low The Central Log Server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- V-100039 Low The Central Log Server must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-100041 Medium The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
- V-100043 Low The Central Log Server must initiate session auditing upon startup.
- V-100045 Low The Central Log Server must produce audit records containing information to establish what type of events occurred.
- V-100047 Low The Central Log Server must produce audit records containing information to establish when (date and time) the events occurred.
- V-100049 Low The Central Log Server must produce audit records containing information to establish where the events occurred.
- V-100051 Low The Central Log Server must produce audit records containing information to establish the source of the events.
- V-100053 Low The Central Log Server must produce audit records that contain information to establish the outcome of the events.
- V-100055 Low The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-100057 Medium The Central Log Server must protect audit information from any type of unauthorized read access.
- V-100059 Medium The Central Log Server must protect audit information from unauthorized modification.
- V-100061 Medium The Central Log Server must protect audit information from unauthorized deletion.
- V-100063 Medium The Central Log Server must protect audit tools from unauthorized access.
- V-100065 Medium The Central Log Server must protect audit tools from unauthorized modification.
- V-100067 Medium The Central Log Server must protect audit tools from unauthorized deletion.
- V-100069 Medium The Central Log Server must be configured to disable non-essential capabilities.
- V-100071 Low The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-100073 High The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
- V-100075 Medium The Central Log Server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.
- V-81105 Medium The Central Log Server must be configured to protect the data sent from hosts and devices from being altered in a way that may prevent the attribution of an action to an individual (or process acting on behalf of an individual).
- V-81107 Low The Central Log Server must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.
- V-81109 Low Time stamps recorded on the log records in the Central Log Server must be configured to synchronize to within one second of the host server or, if NTP is configured directly in the log server, the NTP time source must be the same as the host and devices within its scope of coverage.
- V-81111 Medium Where multiple log servers are installed in the enclave, each log server must be configured to aggregate log records to a central aggregation server or other consolidated events repository.
- V-81113 Low The Central Log Server log records must be configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools.
- V-81115 Medium The Central Log Server must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.
- V-81117 Low The Central Log Server must be configured to allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
- V-81119 Low The Central Log Server must be configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.
- V-81121 Low The Central Log Server must be configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.
- V-81123 Low The Central Log Server must be configured to use internal system clocks to generate time stamps for log records.
- V-81125 Low The Central Log Server must be configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.
- V-81127 Low The Central Log Server system backups must be retained for a minimum of 5 years for SAML and a minimum of 7 days for on media capable of guaranteeing file integrity for a minimum of five years (SAML) and 7 days (non-SAML).
- V-81129 Medium The Central Log Server must be configured to perform audit reduction that supports on-demand reporting requirements.
- V-81131 Low For devices and hosts within its scope of coverage, the Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO) when account modification events are received.
- V-81133 Low For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account disabling actions are received.
- V-81135 Low For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.
- V-81137 Low The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.
- V-81139 Low The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
- V-81141 Low The Central Log Server must be configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users.
- V-81143 Low The Central Log Server must be configured for centralized management of the events repository for the purposes of configuration, analysis, and reporting.
- V-81145 Medium The Central Log Server must be configured to off-load log records onto a different system or media than the system being audited.
- V-81147 Low The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.
- V-81149 Low For the host and devices within its scope of coverage, the Central Log Server must be configured to send a real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) of all audit failure events, such as loss of communications with hosts and devices, or if log records are no longer being received.
- V-81151 Low The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) or Information System Security Officer (ISSO) if communication with the host and devices within its scope of coverage is lost.
- V-81153 Low The Central Log Server must be configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
- V-81155 Low The Central Log Server must be configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
- V-81157 Medium The Central Log Server must be configured to perform audit reduction that supports on-demand audit review and analysis.
- V-81159 Low The Central Log Server must be configured to perform audit reduction that supports after-the-fact investigations of security incidents.
- V-81161 Low The Central Log Server must be configured to generate on-demand audit review and analysis reports.
- V-81163 Low The Central Log Server must be configured to generate reports that support on-demand reporting requirements.
- V-81165 Low The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.
- V-81167 Low The Central Log Server must be configured to perform audit reduction that does not alter original content or time ordering of log records.
- V-81169 Low The Central Log Server must be configured to generate reports that do not alter original content or time ordering of log records.
- V-81171 Low Upon receipt of the log record from hosts and devices, the Central Log Server must be configured to record time stamps of the time of receipt that can be mapped to Coordinated Universal Time (UTC).
- V-81173 Low The Central Log Server must be configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.
- V-81177 Low The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
- V-81179 Medium The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.
- V-81181 Medium The Central Log Server that aggregates log records from hosts and devices must be configured to use TCP for transmission.
- V-81183 Medium The Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- V-81185 Medium The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
- V-81187 Medium For devices and hosts within the scope of coverage, the Central Log Server must be configured to automatically aggregate events that indicate account actions.
- V-81189 Medium The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
- V-81191 Medium Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.
- V-81281 High The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-81283 High For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.
- V-81285 High For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- V-81287 High The Central Log Server, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-81289 High The Central Log Server, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
- V-81291 High The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.
- V-81295 High The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- V-81297 High The Central Log Server must be configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- V-81301 High The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.
- V-81303 High The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.
- V-81307 Medium The Central Log Server must use multifactor authentication for network access to privileged user accounts.
- V-81309 Medium The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.
- V-81313 Medium The Central Log Server must use multifactor authentication for local access using privileged user accounts.
- V-81315 Medium The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-81317 Medium The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- V-81319 Medium The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
- V-81321 Medium The Central Log Server must be configured to enforce a minimum 15-character password length.
- V-81323 Medium The Central Log Server must be configured to accept the DoD CAC credential to support identity management and personal authentication.
- V-81327 Medium The Central Log Server must be configured to electronically verify the DoD CAC credential.
- V-81331 Medium For locally created accounts in the application, the Central Log Server must be configured to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-81335 Low The Central Log Server must be configured to prohibit password reuse for a minimum of five generations.
- V-81337 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one upper-case character be used.
- V-81339 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one lower-case character be used.
- V-81345 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one numeric character be used.
- V-81349 Low The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.
- V-81353 Low The Central Log Server must be configured to require the change of at least 8 of the total number of characters when passwords are changed.
- V-81355 Low The Central Log Server must be configured to enforce 24 hours/1 day as the minimum password lifetime.
- V-81359 Low The Central Log Server must be configured to enforce a 60-day maximum password lifetime restriction.
- V-81363 Low The Central Log Server must map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-AU-001610
- Vuln IDs
-
- V-206447
- V-81297
- Rule IDs
-
- SV-206447r395499_rule
- SV-96011
Checks: C-6707r285585_chk
Verify the Central Log Server user accounts are configured for granular permissions to separate and control access levels of accounts used to access the application. Users should not have access permissions that are not relevant to their role. If the Central Log Server is not configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies, this is a finding.
Fix: F-6707r285586_fix
Configure the Central Log Server with granular permissions to separate and control access levels of accounts used to access the application.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-AU-000010
- Vuln IDs
-
- V-206448
- V-81105
- Rule IDs
-
- SV-206448r395691_rule
- SV-95819
Checks: C-6708r285588_chk
Examine the configuration. Verify the system is configured with a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Verify the Central Log Server is configured to log all changes to the machine data. If the Central Log Server is not configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-6708r285589_fix
Configure the Central Log Server to use a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Configure the Central Log Server to not allow alterations to the machine data.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000020
- Vuln IDs
-
- V-206449
- V-81107
- Rule IDs
-
- SV-206449r395700_rule
- SV-95821
Checks: C-6709r285591_chk
Examine the documentation that lists the scope of coverage for the specific log server being reviewed. Verify the system is configured to aggregate log records from organization-defined devices and hosts within its scope of coverage. If the Central Log Server is not configured to aggregate log records from organization-defined devices and hosts within its scope of coverage, this is a finding.
Fix: F-6709r285592_fix
For each log server, configure the server to aggregate log records from organization-defined devices and hosts within its scope of coverage.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000030
- Vuln IDs
-
- V-206450
- V-81109
- Rule IDs
-
- SV-206450r395700_rule
- SV-95823
Checks: C-6710r285594_chk
Examine the time stamp that indicates when the Central Log Server received the log records. Verify the time is synchronized to within one second of the host server. If an NTP client is configured within the Central Log Server application, verify it is configured to use the same NTP time source as the host and devices within its scope of coverage. If time stamps recorded on the log records in the Central Log Server are not configured to synchronize to within one second of the host server or the log server application is not configured to use the same NTP time source as the host and devices within its scope of coverage, this is a finding.
Fix: F-6710r285595_fix
Configure the Central Log Server such that time stamps on the log records are synchronized to within one second of the host server. If applicable, configure the Central Log Server NTP client to use the same NTP time source as the host and devices within its scope of coverage.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000390
- Vuln IDs
-
- V-206451
- V-81111
- Rule IDs
-
- SV-206451r395700_rule
- SV-95825
Checks: C-6711r285597_chk
Examine the network architecture and documentation. If the log server being reviewed is one of multiple log servers in the enclave or on a network segment, verify that an aggregation server exists and that the log server under review is configured to send records received from the host and devices to the aggregation server or centralized SIEM/events sever. Where multiple log servers are installed in the enclave, if each log server is not configured to send log records to a central aggregation server or other consolidated events repository, this is a finding.
Fix: F-6711r285598_fix
Where multiple log servers are installed in the enclave, configure each log server to forward logs to a consolidated aggregation server.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001353
- Version
- SRG-APP-000088-AU-000040
- Vuln IDs
-
- V-206452
- V-81113
- Rule IDs
-
- SV-206452r395703_rule
- SV-95827
Checks: C-6712r285600_chk
Examine the configuration. Verify log records are configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by a typical analysis tools. If the Central Log Server log records are not configured to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools, this is a finding.
Fix: F-6712r285601_fix
Configure the Central Log Server log records to use the syslog protocol or another industry standard format (e.g., Windows event protocol) that can be used by typical analysis tools.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AU-000400
- Vuln IDs
-
- V-206453
- V-81115
- Rule IDs
-
- SV-206453r395706_rule
- SV-95829
Checks: C-6713r285603_chk
Examine the configuration. Verify the Central Log Server retains the DoD-defined attributes of the log records sent by the devices and hosts. If the Central Log Server is not configured to retain the DoD-defined attributes of the log records sent by the devices and hosts, this is a finding.
Fix: F-6713r285604_fix
Configure the Central Log Server to retain the DoD-defined attributes of the log records sent by the devices and hosts.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000171
- Version
- SRG-APP-000090-AU-000070
- Vuln IDs
-
- V-206454
- V-81117
- Rule IDs
-
- SV-206454r395709_rule
- SV-95831
Checks: C-6714r285606_chk
Examine the configuration. Verify the system is configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained. If the Central Log Server is not configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained, this is a finding.
Fix: F-6714r285607_fix
Configure the Central Log Server to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
- RMF Control
- AU-6
- Severity
- L
- CCI
- CCI-000154
- Version
- SRG-APP-000111-AU-000150
- Vuln IDs
-
- V-206455
- V-81119
- Rule IDs
-
- SV-206455r395808_rule
- SV-95833
Checks: C-6715r285609_chk
Examine the configuration. Verify the system is configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals. If the Central Log Server is not configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals, this is a finding.
Fix: F-6715r285610_fix
Configure the Central Log Server to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-000158
- Version
- SRG-APP-000115-AU-000160
- Vuln IDs
-
- V-206456
- V-81121
- Rule IDs
-
- SV-206456r395814_rule
- SV-95835
Checks: C-6716r285612_chk
Examine the configuration. Verify the system is configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria. If the Central Log Server is not configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria, this is a finding.
Fix: F-6716r285613_fix
Configure the Central Log Server to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AU-000270
- Vuln IDs
-
- V-206457
- V-81123
- Rule IDs
-
- SV-206457r395817_rule
- SV-95837
Checks: C-6717r285615_chk
Examine the configuration. Verify the Central Log Server uses internal system clocks to generate time stamps for log records. If the Central Log Server is not configured to use internal system clocks to generate time stamps for log records, this is a finding.
Fix: F-6717r285616_fix
Configure the Central Log Server to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AU-000300
- Vuln IDs
-
- V-206458
- V-81125
- Rule IDs
-
- SV-206458r395838_rule
- SV-95839
Checks: C-6718r285618_chk
Examine the configuration. Verify the Central Log Server log records repository is backed up at least every seven days onto a different system or system component other than the system or component being audited. If the Central Log Server is not configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited, this is a finding.
Fix: F-6718r285619_fix
Configure the Central Log Server to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.
- RMF Control
- AU-11
- Severity
- L
- CCI
- CCI-000167
- Version
- SRG-APP-000125-AU-000310
- Vuln IDs
-
- V-206459
- V-81127
- Rule IDs
-
- SV-206459r767007_rule
- SV-95841
Checks: C-6719r767005_chk
Review the SSP, backup media documentation, and system backup configuration. Verify the Central Log Server system is backed up to media capable of guaranteeing file integrity for a minimum of five years. If the Central Log Server does not retain backups for a minimum of five years for SAMI and a minimum of seven days for non-SAMI, this is a finding. If the Central Log Server system backups are not stored on appropriate media capable of guaranteeing file integrity for a minimum of five years for systems retaining SAMI, this is a finding.
Fix: F-6719r767006_fix
Configure the Central Log Server to retain backups of system information for a minimum of five years for SAMI and a minimum of seven days for non-SAMI. Select backup media that guarantees file integrity for a minimum of five years for systems retaining SAMI. Document the required retention period in the SSP.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AU-002270
- Vuln IDs
-
- V-206460
- V-81281
- Rule IDs
-
- SV-206460r395859_rule
- SV-95995
Checks: C-6720r285624_chk
Examine the configuration. Verify that individual user accounts are defined within the application. Each account must have a separate identifier. If an authentication server may be used for login, ensure the application audit logs containing management and configuration actions, identify the individual performing each action. If the Central Log Server is not configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-6720r285625_fix
For systems where individual users access, configure and/or manage the system, configure the Central Log Server application so each user is explicitly identified and authenticated. While an authentication server, is often used for logon, this requirement must include instructions for integrating the authentication server so that they system requires unique identification and authentication. Note: Group accounts are not permitted for logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AU-002280
- Vuln IDs
-
- V-206461
- V-81307
- Rule IDs
-
- SV-206461r397438_rule
- SV-96021
Checks: C-6721r285627_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all privileged accounts. If the account of last resort is used for logon via the network (not recommended), then verify it is configured to require multifactor authentication method. If the Central Log Server is not configured to use multifactor authentication for network access to privileged user accounts, this is a finding.
Fix: F-6721r285628_fix
This requirement applies to all privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log server application to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server. If the account of last resort is used for logon via the network (not recommended), then configure the account to require multifactor authentication method.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-AU-002320
- Vuln IDs
-
- V-206462
- V-81309
- Rule IDs
-
- SV-206462r397441_rule
- SV-96023
Checks: C-6722r285630_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts. If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.
Fix: F-6722r285631_fix
This requirement applies to all non-privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-APP-000151-AU-002330
- Vuln IDs
-
- V-206463
- V-81313
- Rule IDs
-
- SV-206463r397444_rule
- SV-96027
Checks: C-6723r285633_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for local logon. If the Central Log Server is not configured to use multifactor authentication for local access using privileged accounts, this is a finding.
Fix: F-6723r285634_fix
This requirement applies to all privileged user accounts used for local logon to the application. For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for local logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001936
- Version
- SRG-APP-000154-AU-002360
- Vuln IDs
-
- V-206464
- V-81315
- Rule IDs
-
- SV-206464r397453_rule
- SV-96029
Checks: C-6724r285636_chk
Examine the configuration. Verify the Central Log Server is configured to use DoD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the Central Log Server is not configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-6724r285637_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use DoD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-AU-002380
- Vuln IDs
-
- V-206465
- V-81317
- Rule IDs
-
- SV-206465r397459_rule
- SV-96031
Checks: C-6725r285639_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. If the Central Log Server does not use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-6725r285640_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-APP-000163-AU-002470
- Vuln IDs
-
- V-206466
- V-81319
- Rule IDs
-
- SV-206466r397498_rule
- SV-96033
Checks: C-6726r285642_chk
Examine the configuration. Verify the Central Log Server is configured to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity. If the Central Log Server does not disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity, this is a finding.
Fix: F-6726r285643_fix
For local accounts (except for the account of last resort), configure the Central Log Server to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-APP-000164-AU-002480
- Vuln IDs
-
- V-206467
- V-81321
- Rule IDs
-
- SV-206467r397501_rule
- SV-96035
Checks: C-6727r285645_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a minimum 15-character password length. If the Central Log Server is not configured to enforce a minimum 15-character password length, this is a finding.
Fix: F-6727r285646_fix
Configure the Central Log Server to enforce a minimum 15-character password length.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000200
- Version
- SRG-APP-000165-AU-002580
- Vuln IDs
-
- V-206468
- V-81335
- Rule IDs
-
- SV-206468r397504_rule
- SV-96049
Checks: C-6728r285648_chk
Examine the configuration. Verify the Central Log Server is configured to prohibit password reuse for a minimum of five generations. If the Central Log Server is not configured to prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-6728r285649_fix
Configure the Central Log Server to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000192
- Version
- SRG-APP-000166-AU-002490
- Vuln IDs
-
- V-206469
- V-81337
- Rule IDs
-
- SV-206469r397507_rule
- SV-96051
Checks: C-6729r285651_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one upper-case character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one upper-case character be used, this is a finding.
Fix: F-6729r285652_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000193
- Version
- SRG-APP-000167-AU-002500
- Vuln IDs
-
- V-206470
- V-81339
- Rule IDs
-
- SV-206470r397510_rule
- SV-96053
Checks: C-6730r285654_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one lower-case character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one lower-case character be used, this is a finding.
Fix: F-6730r285655_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000194
- Version
- SRG-APP-000168-AU-002510
- Vuln IDs
-
- V-206471
- V-81345
- Rule IDs
-
- SV-206471r397513_rule
- SV-96059
Checks: C-6731r285657_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one numeric character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-6731r285658_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-001619
- Version
- SRG-APP-000169-AU-002520
- Vuln IDs
-
- V-206472
- V-81349
- Rule IDs
-
- SV-206472r397516_rule
- SV-96063
Checks: C-6732r285660_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one special character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-6732r285661_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000195
- Version
- SRG-APP-000170-AU-002530
- Vuln IDs
-
- V-206473
- V-81353
- Rule IDs
-
- SV-206473r397519_rule
- SV-96067
Checks: C-6733r285663_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring the change of at least 8 of the total number of characters when passwords are changed. If the Central Log Server is not configured to require the change of at least 8 of the total number of characters when passwords are changed, this is a finding.
Fix: F-6733r285664_fix
Configure the Central Log Server to require the change of at least 8 of the total number of characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000196
- Version
- SRG-APP-000171-AU-002540
- Vuln IDs
-
- V-206474
- V-81283
- Rule IDs
-
- SV-206474r397522_rule
- SV-95997
Checks: C-6734r285666_chk
Examine the configuration. Verify the Central Log Server is configured to store only cryptographic representations of passwords. If the Central Log Server is not configured to store only cryptographic representations of passwords, this is a finding.
Fix: F-6734r285667_fix
Configure the Central Log Server to store only cryptographic representations of passwords.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AU-002550
- Vuln IDs
-
- V-206475
- V-81285
- Rule IDs
-
- SV-206475r397525_rule
- SV-95999
Checks: C-6735r285669_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process. If the Central Log Server is not configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process, this is a finding.
Fix: F-6735r285670_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000198
- Version
- SRG-APP-000173-AU-002560
- Vuln IDs
-
- V-206476
- V-81355
- Rule IDs
-
- SV-206476r397588_rule
- SV-96069
Checks: C-6736r285672_chk
Examine the configuration. Verify the Central Log Server is configured to enforce 24 hours/1 day as the minimum password lifetime. If the Central Log Server is not configured to enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-6736r285673_fix
Configure the Central Log Server to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000199
- Version
- SRG-APP-000174-AU-002570
- Vuln IDs
-
- V-206477
- V-81359
- Rule IDs
-
- SV-206477r397591_rule
- SV-96073
Checks: C-6737r285675_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a 60-day maximum password lifetime restriction. If the Central Log Server is not configured to enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-6737r285676_fix
Configure the Central Log Server to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AU-002630
- Vuln IDs
-
- V-206478
- V-81287
- Rule IDs
-
- SV-206478r397594_rule
- SV-96001
Checks: C-6738r285678_chk
Examine the configuration. Verify the Central Log Server is configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If the Central Log Server is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor, this is a finding.
Fix: F-6738r285679_fix
Configure the Central Log Server to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AU-002640
- Vuln IDs
-
- V-206479
- V-81289
- Rule IDs
-
- SV-206479r397597_rule
- SV-96003
Checks: C-6739r285681_chk
If not using PKI-based authentication this is NA. Examine the configuration. Verify the Central Log Server is configured to enforce authorized access to the corresponding private key when using PKI-based authentication. If the Central Log Server is not configured to enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-6739r285682_fix
If using PKI-based authentication, configure the Central Log Server to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AU-002650
- Vuln IDs
-
- V-206480
- V-81363
- Rule IDs
-
- SV-206480r397600_rule
- SV-96077
Checks: C-6740r285684_chk
Examine the configuration. Verify the Central Log Server is configured to map the authenticated identity to the individual user or group account for PKI-based authentication. If the Central Log Server is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-6740r285685_fix
Configure the Central Log Server to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-AU-002660
- Vuln IDs
-
- V-206481
- V-81291
- Rule IDs
-
- SV-206481r397603_rule
- SV-96005
Checks: C-6741r285687_chk
Examine the configuration. Verify the Central Log Server is configured to obfuscate authentication information during the authentication process so that the authentication is not visible. If the Central Log Server is not configured to obfuscate authentication information during the authentication process so that the authentication is not visible, this is a finding.
Fix: F-6741r285688_fix
Configure the Central Log Server to obfuscate authentication information during the authentication process so that the authentication is not visible to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-AU-002670
- Vuln IDs
-
- V-206482
- V-81295
- Rule IDs
-
- SV-206482r397606_rule
- SV-96009
Checks: C-6742r285690_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-6742r285691_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-AU-000200
- Vuln IDs
-
- V-206483
- V-81129
- Rule IDs
-
- SV-206483r397612_rule
- SV-95843
Checks: C-6743r285693_chk
Examine the configuration. Verify the system is configured to perform audit reduction that supports on-demand reporting requirements. If the Central Log Server is not configured to perform audit reduction that supports on-demand reporting requirements, this is a finding.
Fix: F-6743r285694_fix
Configure the Central Log Server to perform audit reduction that supports on-demand reporting requirements.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001684
- Version
- SRG-APP-000292-AU-000420
- Vuln IDs
-
- V-206484
- V-81131
- Rule IDs
-
- SV-206484r399514_rule
- SV-95845
Checks: C-6744r285696_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage, this is a finding.
Fix: F-6744r285697_fix
Configure the Central Log Server to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001685
- Version
- SRG-APP-000293-AU-000430
- Vuln IDs
-
- V-206485
- V-81133
- Rule IDs
-
- SV-206485r399517_rule
- SV-95847
Checks: C-6745r285699_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account disabling actions are received, this is a finding.
Fix: F-6745r285700_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001686
- Version
- SRG-APP-000294-AU-000440
- Vuln IDs
-
- V-206486
- V-81135
- Rule IDs
-
- SV-206486r399520_rule
- SV-95849
Checks: C-6746r285702_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account removal actions are received, this is a finding.
Fix: F-6746r285703_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001844
- Version
- SRG-APP-000356-AU-000090
- Vuln IDs
-
- V-206490
- V-81143
- Rule IDs
-
- SV-206490r401227_rule
- SV-95857
Checks: C-6750r285711_chk
Examine the configuration. Verify that centralized management of the events repository is enabled and configured for all hosts and devices within the scope of coverage. If the Central Log Server is not enabled to allow centralized management of the events repository for the purposes of configuration, analysis, and reporting, this is a finding.
Fix: F-6750r285712_fix
Configure access for management tools used by administrators at management workstations, particularly those used for remote access. This often uses user access profiles or remote access configuration to enable secure and authorized access to the Central Log Server. Enable management from one or more management workstations or a secure browser. Verify remote communications from the management station using a secure, approved version of the protocol (e.g., TLS). Limit access based on user role, location, or remote device wherever possible.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AU-000100
- Vuln IDs
-
- V-206491
- V-81145
- Rule IDs
-
- SV-206491r399880_rule
- SV-95859
Checks: C-6751r285714_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load log records onto a different system or media than the system being audited. If the Central Log Server is not configured to off-load log records onto a different system or media than the system being audited, this is a finding.
Fix: F-6751r285715_fix
Configure the Central Log Server to off-load log records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- SRG-APP-000359-AU-000120
- Vuln IDs
-
- V-206492
- V-81147
- Rule IDs
-
- SV-206492r399883_rule
- SV-95861
Checks: C-6752r285717_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to send an immediate warning to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of the repository's maximum log record storage capacity. If the Central Log Server is not configured to send an immediate alert to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity, this is a finding.
Fix: F-6752r285718_fix
Configure the Central Log Server to send an immediate alert to the SA, ISSO, and other authorized personnel when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- SRG-APP-000360-AU-000130
- Vuln IDs
-
- V-206493
- V-81149
- Rule IDs
-
- SV-206493r399886_rule
- SV-95863
Checks: C-6753r285720_chk
Examine the configuration. Verify the system is configured to send an alert to the SA and ISSO, within seconds or less, when communication is lost with any host or device within the scope of coverage that may indicate an audit failure. Verify the system is configured to send an alert if hosts and devices stop sending log records to the Central Log Server. If the Central Log Server is not configured to send a real-time alert to the SA and ISSO (at a minimum) of all audit failure events, this is a finding.
Fix: F-6753r285721_fix
For the host and devices within its scope of coverage, configure the Central Log Server to send an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events such as loss of communications with hosts and devices, or if log records are no longer being received.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001861
- Version
- SRG-APP-000361-AU-000140
- Vuln IDs
-
- V-206494
- V-81151
- Rule IDs
-
- SV-206494r399889_rule
- SV-95865
Checks: C-6754r285723_chk
Examine the configuration. Verify the system is configured to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost. If the Central Log Server is not configured to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost, this is a finding.
Fix: F-6754r285724_fix
Configure the Central Log Server to send an immediate alert to the SA or ISSO if communication with the host and devices within its scope of coverage is lost.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001886
- Version
- SRG-APP-000362-AU-000170
- Vuln IDs
-
- V-206495
- V-81153
- Rule IDs
-
- SV-206495r399892_rule
- SV-95867
Checks: C-6755r285726_chk
Examine the configuration. Verify the system is configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-6755r285727_fix
Configure the Central Log Server to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001887
- Version
- SRG-APP-000363-AU-000180
- Vuln IDs
-
- V-206496
- V-81155
- Rule IDs
-
- SV-206496r399895_rule
- SV-95869
Checks: C-6756r285729_chk
Examine the configuration. Verify the Central Log Server performs on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-6756r285730_fix
Configure the Central Log Server to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-AU-000190
- Vuln IDs
-
- V-206497
- V-81157
- Rule IDs
-
- SV-206497r399898_rule
- SV-95871
Checks: C-6757r285732_chk
Examine the configuration. Verify the system performs audit reduction that supports on-demand audit review and analysis. If the Central Log Server is not configured to perform audit reduction that supports on-demand audit review and analysis, this is a finding.
Fix: F-6757r285733_fix
Configure the Central Log Server to perform audit reduction that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001877
- Version
- SRG-APP-000365-AU-000210
- Vuln IDs
-
- V-206498
- V-81159
- Rule IDs
-
- SV-206498r399901_rule
- SV-95873
Checks: C-6758r285735_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that supports after-the-fact investigations of security incidents. If the Central Log Server is not configured to perform audit reduction that supports after-the-fact investigations of security incidents, this is a finding.
Fix: F-6758r285736_fix
Configure the Central Log Server to perform audit reduction that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001878
- Version
- SRG-APP-000366-AU-000220
- Vuln IDs
-
- V-206499
- V-81161
- Rule IDs
-
- SV-206499r399904_rule
- SV-95875
Checks: C-6759r285738_chk
Examine the configuration. Verify the Central Log Server generates on-demand audit review and analysis reports. If the Central Log Server is not configured to generate on-demand audit review and analysis reports, this is a finding.
Fix: F-6759r285739_fix
Configure the Central Log Server to generate on-demand audit review and analysis reports.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001879
- Version
- SRG-APP-000367-AU-000230
- Vuln IDs
-
- V-206500
- V-81163
- Rule IDs
-
- SV-206500r399907_rule
- SV-95877
Checks: C-6760r285741_chk
Examine the configuration. Verify the Central Log Server generates reports that support on-demand reporting requirements. If the Central Log Server is not configured to generate reports that support on-demand reporting requirements, this is a finding.
Fix: F-6760r285742_fix
Configure the Central Log Server to generate reports that support on-demand reporting requirements.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001880
- Version
- SRG-APP-000368-AU-000240
- Vuln IDs
-
- V-206501
- V-81165
- Rule IDs
-
- SV-206501r399910_rule
- SV-95879
Checks: C-6761r285744_chk
Examine the configuration. Verify the Central Log Server generates reports that support after-the-fact investigations of security incidents. If the Central Log Server is not configured to generate reports that support after-the-fact investigations of security incidents, this is a finding.
Fix: F-6761r285745_fix
Configure the Central Log Server to generate reports that support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001881
- Version
- SRG-APP-000369-AU-000250
- Vuln IDs
-
- V-206502
- V-81167
- Rule IDs
-
- SV-206502r399913_rule
- SV-95881
Checks: C-6762r285747_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that does not alter original content or time ordering of log records. If the Central Log Server is not configured to perform audit reduction that does not alter original content or time ordering of log records, this is a finding.
Fix: F-6762r285748_fix
Configure the Central Log Server to perform audit reduction that does not alter original content or time ordering of log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001882
- Version
- SRG-APP-000370-AU-000260
- Vuln IDs
-
- V-206503
- V-81169
- Rule IDs
-
- SV-206503r399916_rule
- SV-95883
Checks: C-6763r285750_chk
Examine the configuration. Verify the Central Log Server generates reports that do not alter original content or time ordering of log records. If the Central Log Server is not configured to generate reports that do not alter original content or time ordering of log records, this is a finding.
Fix: F-6763r285751_fix
Configure the Central Log Server to generate reports that do not alter original content or time ordering of log records.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AU-000290
- Vuln IDs
-
- V-206504
- V-81171
- Rule IDs
-
- SV-206504r399928_rule
- SV-95885
Checks: C-6764r285753_chk
Examine the log records stored on the events server. Verify the Central Log Server records time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC. If the Central Log Server is not configured to record time stamps of the time the record was received or the time stamp is not mapped to UTC, this is a finding.
Fix: F-6764r285754_fix
Configure the Central Log Server to record time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AU-000280
- Vuln IDs
-
- V-206505
- V-81173
- Rule IDs
-
- SV-206505r399931_rule
- SV-95887
Checks: C-6765r285756_chk
Examine the configuration. Verify the Central Log Server records time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision. If the Central Log Server is not configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-6765r285757_fix
Configure the Central Log Server to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-AU-002290
- Vuln IDs
-
- V-206506
- V-81323
- Rule IDs
-
- SV-206506r400039_rule
- SV-96037
Checks: C-6766r285759_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credential to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credential to support identity management and personal authentication, this is a finding.
Fix: F-6766r285760_fix
Configure the Central Log Server to accept the DoD CAC credential to support identity management and personal authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-AU-002300
- Vuln IDs
-
- V-206507
- V-81327
- Rule IDs
-
- SV-206507r400042_rule
- SV-96041
Checks: C-6767r285762_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credentials to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credentials to support identity management and personal authentication, this is a finding.
Fix: F-6767r285763_fix
Configure the Central Log Server to accept the DoD CAC credentials to support identity management and personal authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-APP-000397-AU-002590
- Vuln IDs
-
- V-206508
- V-81331
- Rule IDs
-
- SV-206508r400114_rule
- SV-96045
Checks: C-6768r285765_chk
Examine the configuration. Verify the Central Log Server is configured to allow the use of a temporary password for system logons with an immediate change to a permanent password. If the Central Log Server is not configured to allow the use of a temporary password for system logons with an immediate change to a permanent password, this is a finding.
Fix: F-6768r285766_fix
Configure the Central Log Server to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AU-004310
- Vuln IDs
-
- V-206509
- V-81301
- Rule IDs
-
- SV-206509r400474_rule
- SV-96015
Checks: C-6769r285768_chk
Examine the configuration. Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function. If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.
Fix: F-6769r285769_fix
Configure the Central Log Server to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AU-002890
- Vuln IDs
-
- V-206510
- V-81303
- Rule IDs
-
- SV-206510r400876_rule
- SV-96017
Checks: C-6770r285771_chk
Examine the configuration. Verify the Central Log Server is configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If the Central Log Server is not configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-6770r285772_fix
Configure the Central Log Server to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001851
- Version
- SRG-APP-000515-AU-000110
- Vuln IDs
-
- V-206511
- V-81177
- Rule IDs
-
- SV-206511r400879_rule
- SV-95891
Checks: C-6771r285774_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum. If the Central Log Server is not configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum, this is a finding.
Fix: F-6771r285775_fix
Configure the Central Log Server to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000330
- Vuln IDs
-
- V-206512
- V-81179
- Rule IDs
-
- SV-206512r401224_rule
- SV-95893
Checks: C-6772r285777_chk
Examine the configuration. Verify the Central Log Server is configured to include the identity of the original source host or device where the event occurred as part of each aggregated log record. If the Central Log Server is not configured to include the identity of the original source host or device where the event occurred as part of the aggregated log record, this is a finding.
Fix: F-6772r285778_fix
Configure the Central Log Server to include the identity of the original source host or device as part of each aggregated log record.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000340
- Vuln IDs
-
- V-206513
- V-81181
- Rule IDs
-
- SV-206513r401224_rule
- SV-95895
Checks: C-6773r285780_chk
Examine the configuration. Verify the Central Log Server is configured to use TCP. If the Central Log Server is not configured to use TCP, this is a finding.
Fix: F-6773r285781_fix
Configure the Central Log Server that aggregates log records from hosts and devices to use TCP for transmission.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000350
- Vuln IDs
-
- V-206514
- V-81183
- Rule IDs
-
- SV-206514r401224_rule
- SV-95897
Checks: C-6774r285783_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog, SIEM) does not perform analysis. This is NA if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage, this is a finding.
Fix: F-6774r285784_fix
Configure the Central Log Server to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000360
- Vuln IDs
-
- V-206515
- V-81185
- Rule IDs
-
- SV-206515r401224_rule
- SV-95899
Checks: C-6775r285786_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog) does not perform analysis. Examine the configuration. Verify the Central Log Server automatically creates trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds). If the Central Log Server is not configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds), this is a finding.
Fix: F-6775r285787_fix
Configure the Central Log Server to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000370
- Vuln IDs
-
- V-206516
- V-81187
- Rule IDs
-
- SV-206516r401224_rule
- SV-95901
Checks: C-6776r285789_chk
Examine the configuration. Verify the Central Log Server automatically aggregates events that indicate account actions for each device and host within its scope of coverage. If the Central Log Server is not configured to automatically aggregate events that indicate account actions for each device and host within its scope of coverage, this is a finding.
Fix: F-6776r285790_fix
Configure the Central Log Server to automatically aggregate events that indicate account actions for each device and host within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000380
- Vuln IDs
-
- V-206517
- V-81189
- Rule IDs
-
- SV-206517r401224_rule
- SV-95903
Checks: C-6777r285792_chk
Obtain the site’s SSP to see which criticality levels are used for each system within the scope of the Central Log Server. Examine the configuration of the Central Log Server. Verify the Central Log Server is configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts. If the Central Log Server is not configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts, this is a finding.
Fix: F-6777r285793_fix
Configure the Central Log Server with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000410
- Vuln IDs
-
- V-206518
- V-81191
- Rule IDs
-
- SV-206518r401224_rule
- SV-95905
Checks: C-6778r285795_chk
Examine the configuration. Verify analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are configured to comply with DoD-trusted path and access requirements. If analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are not configured to comply with DoD-trusted path and access requirements, this is a finding.
Fix: F-6778r285796_fix
Configure all analysis, viewing, and indexing functions, services, and applications used with the Central Log Server to comply with DoD-trusted path and access requirements.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-AU-000580
- Vuln IDs
-
- V-221900
- V-100025
- Rule IDs
-
- SV-221900r420044_rule
- SV-109129
Checks: C-23615r420042_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account creation. If the Central Log Server is not configured to automatically audit account creation, this is a finding.
Fix: F-23604r420043_fix
Configure the Central Log Server to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-AU-000590
- Vuln IDs
-
- V-221901
- V-100027
- Rule IDs
-
- SV-221901r420047_rule
- SV-109131
Checks: C-23616r420045_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account modification. If the Central Log Server is not configured to automatically audit account modification, this is a finding.
Fix: F-23605r420046_fix
Configure the Central Log Server to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-AU-000600
- Vuln IDs
-
- V-221902
- V-100029
- Rule IDs
-
- SV-221902r420050_rule
- SV-109133
Checks: C-23617r420048_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account disabling. If the Central Log Server is not configured to automatically audit account disabling, this is a finding.
Fix: F-23606r420049_fix
Configure the Central Log Server to automatically audit account disabling.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-AU-000610
- Vuln IDs
-
- V-221903
- V-100031
- Rule IDs
-
- SV-221903r420053_rule
- SV-109135
Checks: C-23618r420051_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account removal. If the Central Log Server is not configured to automatically audit account removal, this is a finding.
Fix: F-23607r420052_fix
Configure the Central Log Server to automatically audit account removal.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-AU-000240
- Vuln IDs
-
- V-221904
- V-100033
- Rule IDs
-
- SV-221904r420056_rule
- SV-109137
Checks: C-23619r420054_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account after 3 consecutive invalid attempts during a 15 minute period. If the Central Log Server is not configured to lock out the account after 3 consecutive invalid attempts in 15 minutes, this is a finding.
Fix: F-23608r420055_fix
Configure the Central Log Server to lock out the account after 3 consecutive invalid attempts during a 15 minute period.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SRG-APP-000068-AU-000035
- Vuln IDs
-
- V-221905
- V-100037
- Rule IDs
-
- SV-221905r420059_rule
- SV-109141
Checks: C-23620r420057_chk
Examine the configuration. Verify that the Central Log Server is configured to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server. If the Central Log Server is not configured to display the Mandatory DoD Notice and Consent Banner, this is a finding.
Fix: F-23609r420058_fix
Configure the Central Log Server to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- SRG-APP-000069-AU-000420
- Vuln IDs
-
- V-221906
- V-100039
- Rule IDs
-
- SV-221906r420062_rule
- SV-109143
Checks: C-23621r420060_chk
Examine the configuration. Verify that the Central Log Server is configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions. If the Central Log Server is not configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions, this is a finding.
Fix: F-23610r420061_fix
Configure the Central Log Server to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions.
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001464
- Version
- SRG-APP-000092-AU-000670
- Vuln IDs
-
- V-221907
- V-100043
- Rule IDs
-
- SV-221907r420065_rule
- SV-109147
Checks: C-23622r420063_chk
Examine the configuration. Verify that the Central Log Server initiates session logging upon startup. If the Central Log Server is not configured to initiate session logging upon startup, this is a finding.
Fix: F-23611r420064_fix
Configure the Central Log Server to initiate session logging upon startup.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AU-000680
- Vuln IDs
-
- V-221908
- V-100045
- Rule IDs
-
- SV-221908r420068_rule
- SV-109149
Checks: C-23623r420066_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish what type of events occurred. If the Central Log Server is not configured to produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-23612r420067_fix
Configure the Central Log Server to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AU-000690
- Vuln IDs
-
- V-221909
- V-100047
- Rule IDs
-
- SV-221909r420071_rule
- SV-109151
Checks: C-23624r420069_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish when the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-23613r420070_fix
Configure the Central Log Server to produce audit records containing information to establish when the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AU-000700
- Vuln IDs
-
- V-221910
- V-100049
- Rule IDs
-
- SV-221910r420074_rule
- SV-109153
Checks: C-23625r420072_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish where the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-23614r420073_fix
Configure the Central Log Server to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AU-000710
- Vuln IDs
-
- V-221911
- V-100051
- Rule IDs
-
- SV-221911r420077_rule
- SV-109155
Checks: C-23626r420075_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the source of the events. If the Central Log Server is not configured to produce audit records containing information to establish the source of the events, this is a finding.
Fix: F-23615r420076_fix
Configure the Central Log Server to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AU-000720
- Vuln IDs
-
- V-221912
- V-100053
- Rule IDs
-
- SV-221912r420080_rule
- SV-109157
Checks: C-23627r420078_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the outcome of the events. If the Central Log Server is not configured to produce audit records containing information to establish the outcome of the events, this is a finding.
Fix: F-23616r420079_fix
Configure the Central Log Server to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AU-000730
- Vuln IDs
-
- V-221913
- V-100055
- Rule IDs
-
- SV-221913r420083_rule
- SV-109159
Checks: C-23628r420081_chk
The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
Fix: F-23617r420082_fix
Configure the Central Log Server to produce audit records containing information to establish the identity of the individual or process associated with the event.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-AU-000100
- Vuln IDs
-
- V-221914
- V-100057
- Rule IDs
-
- SV-221914r420086_rule
- SV-109161
Checks: C-23629r420084_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized read access. If the Central Log Server is not configured to protect audit information from any unauthorized read access, this is a finding.
Fix: F-23618r420085_fix
Configure the Central Log Server to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-AU-000110
- Vuln IDs
-
- V-221915
- V-100059
- Rule IDs
-
- SV-221915r420089_rule
- SV-109163
Checks: C-23630r420087_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized modification. If the Central Log Server is not configured to protect audit information from any unauthorized modification, this is a finding.
Fix: F-23619r420088_fix
Configure the Central Log Server to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-AU-000120
- Vuln IDs
-
- V-221916
- V-100061
- Rule IDs
-
- SV-221916r420092_rule
- SV-109165
Checks: C-23631r420090_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from unauthorized deletion. If the Central Log Server is not configured to protect audit information from unauthorized deletion, this is a finding.
Fix: F-23620r420091_fix
Configure the Central Log Server to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-AU-000130
- Vuln IDs
-
- V-221917
- V-100063
- Rule IDs
-
- SV-221917r420095_rule
- SV-109167
Checks: C-23632r420093_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized access. If the Central Log Server is not configured to protect audit tools from unauthorized access, this is a finding.
Fix: F-23621r420094_fix
Configure the Central Log Server to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-AU-000140
- Vuln IDs
-
- V-221918
- V-100065
- Rule IDs
-
- SV-221918r420098_rule
- SV-109169
Checks: C-23633r420096_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized modification. If the Central Log Server is not configured to protect audit tools from unauthorized modification, this is a finding.
Fix: F-23622r420097_fix
Configure the Central Log Server to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-AU-000150
- Vuln IDs
-
- V-221919
- V-100067
- Rule IDs
-
- SV-221919r420101_rule
- SV-109171
Checks: C-23634r420099_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized deletion. If the Central Log Server is not configured to protect audit tools from unauthorized deletion, this is a finding.
Fix: F-23623r420100_fix
Configure the Central Log Server to protect audit tools from unauthorized deletion.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AU-000090
- Vuln IDs
-
- V-221920
- V-100069
- Rule IDs
-
- SV-221920r420104_rule
- SV-109173
Checks: C-23635r420102_chk
Examine the configuration. Verify that the Central Log Server is configured to disable non-essential capabilities. If the Central Log Server is not configured to disable non-essential capabilities, this is a finding.
Fix: F-23624r420103_fix
Configure the Central Log Server to disable non-essential capabilities.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001683
- Version
- SRG-APP-000291-AU-000200
- Vuln IDs
-
- V-221921
- V-100021
- Rule IDs
-
- SV-221921r420107_rule
- SV-109125
Checks: C-23636r420105_chk
Examine the configuration. Verify that the Central Log Server is configured to notify system administrators and the ISSO when accounts are created. If the Central Log Server is not configured to notify system administrators and ISSO when accounts are created, this is a finding.
Fix: F-23625r420106_fix
Configure the Central Log Server to notify system administrators and the ISSO when accounts are created.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-AU-000190
- Vuln IDs
-
- V-221922
- V-100015
- Rule IDs
-
- SV-221922r420110_rule
- SV-109119
Checks: C-23637r420108_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically terminate a user session after organization-defined conditions or trigger events. If the Central Log Server is not configured to automatically terminate a user session after organization-defined conditions or trigger events, this is a finding.
Fix: F-23626r420109_fix
Configure the Central Log Server to automatically terminate a user session after organization-defined conditions or trigger events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-AU-000560
- Vuln IDs
-
- V-221923
- V-100017
- Rule IDs
-
- SV-221923r420113_rule
- SV-109121
Checks: C-23638r420111_chk
Examine the configuration. Verify that the Central Log Server provides a logout capability for user initiated sessions. If the Central Log Server does not provide a logout capability for user initiated sessions, this is a finding.
Fix: F-23627r420112_fix
Configure the Central Log Server to provide a logout capability for user initiated sessions.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002364
- Version
- SRG-APP-000297-AU-000570
- Vuln IDs
-
- V-221924
- V-100019
- Rule IDs
-
- SV-221924r420116_rule
- SV-109123
Checks: C-23639r420114_chk
Examine the configuration. Verify that the Central Log Server is configured to display an explicit logout message to users indicating the reliable termination of authenticated sessions. If the Central Log Server is not configured to display an explicit logout message to users, it is a finding.
Fix: F-23628r420115_fix
Configure the Central Log Server to display an explicit logout message to users indicating the reliable termination of authenticated sessions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-AU-000400
- Vuln IDs
-
- V-221925
- V-100035
- Rule IDs
-
- SV-221925r420119_rule
- SV-109139
Checks: C-23640r420117_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded. If the Central Log Server is not configured to lock out the account until released by an administrator when 3 consecutive invalid attempts in 15 minutes is exceeded, this is a finding.
Fix: F-23629r420118_fix
Configure the Central Log Server to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded.
- RMF Control
- IA-11
- Severity
- L
- CCI
- CCI-002038
- Version
- SRG-APP-000389-AU-000180
- Vuln IDs
-
- V-221926
- V-100071
- Rule IDs
-
- SV-221926r420122_rule
- SV-109175
Checks: C-23641r420120_chk
Examine the configuration. Verify the Central Log Server requires users to reauthenticate when situations require reauthentication. If the Central Log Server is not configured to reauthenticate when necessary, this is a finding.
Fix: F-23630r420121_fix
Configure the Central Log Server to reauthenticate users when situations require reauthentication.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-AU-000040
- Vuln IDs
-
- V-221927
- V-100075
- Rule IDs
-
- SV-221927r420125_rule
- SV-109179
Checks: C-23642r420123_chk
Examine the configuration. Verify the Central Log Server is configured to only allow the use of DoD PKI certificate authorities. If the Central Log Server is not configured to only allow DoD PKI certificate authorities, this is a finding.
Fix: F-23631r420124_fix
Configure the Central Log Server to only allow the use of DoD PKI certificate authorities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-AU-000280
- Vuln IDs
-
- V-221928
- V-100041
- Rule IDs
-
- SV-221928r420128_rule
- SV-109145
Checks: C-23643r420126_chk
Examine the configuration. Verify that the Central Log Server generates audit records when successful/unsuccessful logon attempts occur. If the Central Log Server is not configured to generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-23632r420127_fix
Configure the Central Log Server to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000610-AU-000050
- Vuln IDs
-
- V-221929
- V-100073
- Rule IDs
-
- SV-221929r531240_rule
- SV-109177
Checks: C-23644r420129_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-23633r531239_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- SRG-APP-000095-AU-000050
- Vuln IDs
-
- V-241819
- V-81137
- Rule IDs
-
- SV-241819r695402_rule
- SV-95851
Checks: C-45095r695400_chk
Examine the configuration. Verify the SA and ISSM have been assigned the privileges needed to allow these roles to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Verify the retention configuration for each host and device is in compliance with the documented organization criteria, including the identified criticality level, event type, and/or retention period. If the Central Log Server is not configured to allow the SA and ISSM to change the retention of the log records, this is a finding. If the retention is not in compliance with the organization’s documentation, this is a finding.
Fix: F-45054r695401_fix
Configure the Central Log Server with the privileges needed to allow the SA and ISSM to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Based on the documented requirements for each application, configure the events server to retain log records based on criticality level, type of event, and/or retention period, at a minimum.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000060
- Vuln IDs
-
- V-241820
- V-81139
- Rule IDs
-
- SV-241820r695405_rule
- SV-95853
Checks: C-45096r695403_chk
Examine the configuration. Verify the system is configured so changes made to the level and type of log records stored in the centralized repository take effect immediately without the need to reboot or restart the application. If the Central Log Server is not configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application, this is a finding.
Fix: F-45055r695404_fix
Configure the Central Log Server so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.