Central Log Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V3R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-221926 Low The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-AU-001610
- Vuln IDs
-
- V-206447
- V-81297
- Rule IDs
-
- SV-206447r960792_rule
- SV-96011
Checks: C-6707r285585_chk
Verify the Central Log Server user accounts are configured for granular permissions to separate and control access levels of accounts used to access the application. Users should not have access permissions that are not relevant to their role. If the Central Log Server is not configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies, this is a finding.
Fix: F-6707r285586_fix
Configure the Central Log Server with granular permissions to separate and control access levels of accounts used to access the application.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-AU-000010
- Vuln IDs
-
- V-206448
- V-81105
- Rule IDs
-
- SV-206448r960864_rule
- SV-95819
Checks: C-6708r285588_chk
Examine the configuration. Verify the system is configured with a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Verify the Central Log Server is configured to log all changes to the machine data. If the Central Log Server is not configured to protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation, this is a finding.
Fix: F-6708r285589_fix
Configure the Central Log Server to use a hash or other method that protects the data against alteration of the log information sent from hosts and devices. Configure the Central Log Server to not allow alterations to the machine data.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000020
- Vuln IDs
-
- V-206449
- V-81107
- Rule IDs
-
- SV-206449r960873_rule
- SV-95821
Checks: C-6709r285591_chk
Examine the documentation that lists the scope of coverage for the specific log server being reviewed. Verify the system is configured to aggregate log records from organization-defined devices and hosts within its scope of coverage. If the Central Log Server is not configured to aggregate log records from organization-defined devices and hosts within its scope of coverage, this is a finding.
Fix: F-6709r285592_fix
For each log server, configure the server to aggregate log records from organization-defined devices and hosts within its scope of coverage.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000030
- Vuln IDs
-
- V-206450
- V-81109
- Rule IDs
-
- SV-206450r960873_rule
- SV-95823
Checks: C-6710r285594_chk
Examine the time stamp that indicates when the Central Log Server received the log records. Verify the time is synchronized to within one second of the host server. If an NTP client is configured within the Central Log Server application, verify it is configured to use the same NTP time source as the host and devices within its scope of coverage. If time stamps recorded on the log records in the Central Log Server are not configured to synchronize to within one second of the host server or the log server application is not configured to use the same NTP time source as the host and devices within its scope of coverage, this is a finding.
Fix: F-6710r285595_fix
Configure the Central Log Server such that time stamps on the log records are synchronized to within one second of the host server. If applicable, configure the Central Log Server NTP client to use the same NTP time source as the host and devices within its scope of coverage.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SRG-APP-000086-AU-000390
- Vuln IDs
-
- V-206451
- V-81111
- Rule IDs
-
- SV-206451r960873_rule
- SV-95825
Checks: C-6711r285597_chk
Examine the network architecture and documentation. If the log server being reviewed is one of multiple log servers in the enclave or on a network segment, verify that an aggregation server exists and that the log server under review is configured to send records received from the host and devices to the aggregation server or centralized SIEM/events sever. Where multiple log servers are installed in the enclave, if each log server is not configured to send log records to a central aggregation server or other consolidated events repository, this is a finding.
Fix: F-6711r285598_fix
Where multiple log servers are installed in the enclave, configure each log server to forward logs to a consolidated aggregation server.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-AU-000400
- Vuln IDs
-
- V-206453
- V-81115
- Rule IDs
-
- SV-206453r960879_rule
- SV-95829
Checks: C-6713r285603_chk
Examine the configuration. Verify the Central Log Server retains the DoD-defined attributes of the log records sent by the devices and hosts. If the Central Log Server is not configured to retain the DoD-defined attributes of the log records sent by the devices and hosts, this is a finding.
Fix: F-6713r285604_fix
Configure the Central Log Server to retain the DoD-defined attributes of the log records sent by the devices and hosts.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000171
- Version
- SRG-APP-000090-AU-000070
- Vuln IDs
-
- V-206454
- V-81117
- Rule IDs
-
- SV-206454r960882_rule
- SV-95831
Checks: C-6714r285606_chk
Examine the configuration. Verify the system is configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained. If the Central Log Server is not configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained, this is a finding.
Fix: F-6714r285607_fix
Configure the Central Log Server to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
- RMF Control
- AU-6
- Severity
- L
- CCI
- CCI-000154
- Version
- SRG-APP-000111-AU-000150
- Vuln IDs
-
- V-206455
- V-81119
- Rule IDs
-
- SV-206455r960918_rule
- SV-95833
Checks: C-6715r285609_chk
Examine the configuration. Verify the system is configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals. If the Central Log Server is not configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals, this is a finding.
Fix: F-6715r285610_fix
Configure the Central Log Server to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-000158
- Version
- SRG-APP-000115-AU-000160
- Vuln IDs
-
- V-206456
- V-81121
- Rule IDs
-
- SV-206456r960924_rule
- SV-95835
Checks: C-6716r285612_chk
Examine the configuration. Verify the system is configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria. If the Central Log Server is not configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria, this is a finding.
Fix: F-6716r285613_fix
Configure the Central Log Server to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-000159
- Version
- SRG-APP-000116-AU-000270
- Vuln IDs
-
- V-206457
- V-81123
- Rule IDs
-
- SV-206457r960927_rule
- SV-95837
Checks: C-6717r285615_chk
Examine the configuration. Verify the Central Log Server uses internal system clocks to generate time stamps for log records. If the Central Log Server is not configured to use internal system clocks to generate time stamps for log records, this is a finding.
Fix: F-6717r285616_fix
Configure the Central Log Server to use internal system clocks to generate time stamps for log records.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- SRG-APP-000125-AU-000300
- Vuln IDs
-
- V-206458
- V-81125
- Rule IDs
-
- SV-206458r960948_rule
- SV-95839
Checks: C-6718r285618_chk
Examine the configuration. Verify the Central Log Server log records repository is backed up at least every seven days onto a different system or system component other than the system or component being audited. If the Central Log Server is not configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited, this is a finding.
Fix: F-6718r285619_fix
Configure the Central Log Server to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.
- RMF Control
- AU-11
- Severity
- L
- CCI
- CCI-000167
- Version
- SRG-APP-000125-AU-000310
- Vuln IDs
-
- V-206459
- V-81127
- Rule IDs
-
- SV-206459r960948_rule
- SV-95841
Checks: C-6719r864170_chk
Review the SSP, backup media documentation, and system backup configuration. Verify the Central Log Server system is backed up to media capable of guaranteeing file integrity for a minimum of five years. If the Central Log Server does not retain backups for a minimum of five years for SAMI and a minimum of seven days for non-SAMI, this is a finding. If the Central Log Server system backups are not stored on appropriate media capable of guaranteeing file integrity for a minimum of five years for systems retaining SAMI, this is a finding.
Fix: F-6719r864171_fix
Configure the Central Log Server to retain backups of system information for a minimum of five years for SAMI and a minimum of seven days for non-SAMI. Select backup media that guarantees file integrity for a minimum of five years for systems retaining SAMI. Document the required retention period in the SSP.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SRG-APP-000148-AU-002270
- Vuln IDs
-
- V-206460
- V-81281
- Rule IDs
-
- SV-206460r1051115_rule
- SV-95995
Checks: C-6720r285624_chk
Examine the configuration. Verify that individual user accounts are defined within the application. Each account must have a separate identifier. If an authentication server may be used for login, ensure the application audit logs containing management and configuration actions, identify the individual performing each action. If the Central Log Server is not configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-6720r285625_fix
For systems where individual users access, configure and/or manage the system, configure the Central Log Server application so each user is explicitly identified and authenticated. While an authentication server, is often used for logon, this requirement must include instructions for integrating the authentication server so that they system requires unique identification and authentication. Note: Group accounts are not permitted for logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000149-AU-002280
- Vuln IDs
-
- V-206461
- V-81307
- Rule IDs
-
- SV-206461r960972_rule
- SV-96021
Checks: C-6721r285627_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all privileged accounts. If the account of last resort is used for logon via the network (not recommended), then verify it is configured to require multifactor authentication method. If the Central Log Server is not configured to use multifactor authentication for network access to privileged user accounts, this is a finding.
Fix: F-6721r285628_fix
This requirement applies to all privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log server application to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server. If the account of last resort is used for logon via the network (not recommended), then configure the account to require multifactor authentication method.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-APP-000150-AU-002320
- Vuln IDs
-
- V-206462
- V-81309
- Rule IDs
-
- SV-206462r960975_rule
- SV-96023
Checks: C-6722r285630_chk
Examine the configuration. Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts. If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.
Fix: F-6722r285631_fix
This requirement applies to all non-privileged accounts used for access to the system via network access. For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-APP-000151-AU-002330
- Vuln IDs
-
- V-206463
- V-81313
- Rule IDs
-
- SV-206463r981723_rule
- SV-96027
Checks: C-6723r981721_chk
Examine the configuration. Verify the Central Log Server is configured to require DOD PKI or another multifactor authentication method for local logon. If the Central Log Server is not configured to use multifactor authentication for local access using privileged accounts, this is a finding.
Fix: F-6723r981722_fix
This requirement applies to all privileged user accounts used for local logon to the application. For systems where individual users access, configure, and/or manage the system, configure the Central Log Server to use DOD PKI (preferred) or another multifactor authentication solution for local logon to the Central Log Server.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000154-AU-002360
- Vuln IDs
-
- V-206464
- V-81315
- Rule IDs
-
- SV-206464r981726_rule
- SV-96029
Checks: C-6724r981724_chk
Examine the configuration. Verify the Central Log Server is configured to use DOD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the Central Log Server is not configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-6724r981725_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use DOD PKI or another form of multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-APP-000156-AU-002380
- Vuln IDs
-
- V-206465
- V-81317
- Rule IDs
-
- SV-206465r960993_rule
- SV-96031
Checks: C-6725r285639_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts. If the Central Log Server does not use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts, this is a finding.
Fix: F-6725r285640_fix
This requirement applies to all privileged user accounts used for network logon to the application. Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000163-AU-002470
- Vuln IDs
-
- V-206466
- V-81319
- Rule IDs
-
- SV-206466r981727_rule
- SV-96033
Checks: C-6726r285642_chk
Examine the configuration. Verify the Central Log Server is configured to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity. If the Central Log Server does not disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity, this is a finding.
Fix: F-6726r285643_fix
For local accounts (except for the account of last resort), configure the Central Log Server to disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000164-AU-002480
- Vuln IDs
-
- V-206467
- V-81321
- Rule IDs
-
- SV-206467r981728_rule
- SV-96035
Checks: C-6727r285645_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a minimum 15-character password length. If the Central Log Server is not configured to enforce a minimum 15-character password length, this is a finding.
Fix: F-6727r285646_fix
Configure the Central Log Server to enforce a minimum 15-character password length.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000166-AU-002490
- Vuln IDs
-
- V-206469
- V-81337
- Rule IDs
-
- SV-206469r981732_rule
- SV-96051
Checks: C-6729r981730_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one uppercase character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one uppercase character be used, this is a finding.
Fix: F-6729r981731_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one uppercase character be used.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000167-AU-002500
- Vuln IDs
-
- V-206470
- V-81339
- Rule IDs
-
- SV-206470r981735_rule
- SV-96053
Checks: C-6730r981733_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one lowercase character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one lowercase character be used, this is a finding.
Fix: F-6730r981734_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one lowercase character be used.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000168-AU-002510
- Vuln IDs
-
- V-206471
- V-81345
- Rule IDs
-
- SV-206471r981736_rule
- SV-96059
Checks: C-6731r285657_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one numeric character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one numeric character be used, this is a finding.
Fix: F-6731r285658_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000169-AU-002520
- Vuln IDs
-
- V-206472
- V-81349
- Rule IDs
-
- SV-206472r981737_rule
- SV-96063
Checks: C-6732r285660_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring that at least one special character be used. If the Central Log Server is not configured to enforce password complexity by requiring that at least one special character be used, this is a finding.
Fix: F-6732r285661_fix
Configure the Central Log Server to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000170-AU-002530
- Vuln IDs
-
- V-206473
- V-81353
- Rule IDs
-
- SV-206473r1043189_rule
- SV-96067
Checks: C-6733r981738_chk
Examine the configuration. Verify the Central Log Server is configured to enforce password complexity by requiring the change of at least eight of the total number of characters when passwords are changed. If the Central Log Server is not configured to require the change of at least eight of the total number of characters when passwords are changed, this is a finding.
Fix: F-6733r981739_fix
Configure the Central Log Server to require the change of at least eight of the total number of characters when passwords are changed.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- SRG-APP-000171-AU-002540
- Vuln IDs
-
- V-206474
- V-81283
- Rule IDs
-
- SV-206474r981742_rule
- SV-95997
Checks: C-6734r285666_chk
Examine the configuration. Verify the Central Log Server is configured to store only cryptographic representations of passwords. If the Central Log Server is not configured to store only cryptographic representations of passwords, this is a finding.
Fix: F-6734r981741_fix
Configure the Central Log Server to store only cryptographic representations of passwords.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-AU-002550
- Vuln IDs
-
- V-206475
- V-81285
- Rule IDs
-
- SV-206475r961029_rule
- SV-95999
Checks: C-6735r285669_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process. If the Central Log Server is not configured to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process, this is a finding.
Fix: F-6735r285670_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000173-AU-002560
- Vuln IDs
-
- V-206476
- V-81355
- Rule IDs
-
- SV-206476r981743_rule
- SV-96069
Checks: C-6736r285672_chk
Examine the configuration. Verify the Central Log Server is configured to enforce 24 hours/1 day as the minimum password lifetime. If the Central Log Server is not configured to enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-6736r285673_fix
Configure the Central Log Server to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- Severity
- L
- CCI
- CCI-004066
- Version
- SRG-APP-000174-AU-002570
- Vuln IDs
-
- V-206477
- V-81359
- Rule IDs
-
- SV-206477r1043190_rule
- SV-96073
Checks: C-6737r285675_chk
Examine the configuration. Verify the Central Log Server is configured to enforce a 60-day maximum password lifetime restriction. If the Central Log Server is not configured to enforce a 60-day maximum password lifetime restriction, this is a finding.
Fix: F-6737r285676_fix
Configure the Central Log Server to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- SRG-APP-000175-AU-002630
- Vuln IDs
-
- V-206478
- V-81287
- Rule IDs
-
- SV-206478r961038_rule
- SV-96001
Checks: C-6738r285678_chk
Examine the configuration. Verify the Central Log Server is configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If the Central Log Server is not configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor, this is a finding.
Fix: F-6738r285679_fix
Configure the Central Log Server to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- SRG-APP-000176-AU-002640
- Vuln IDs
-
- V-206479
- V-81289
- Rule IDs
-
- SV-206479r961041_rule
- SV-96003
Checks: C-6739r285681_chk
If not using PKI-based authentication this is NA. Examine the configuration. Verify the Central Log Server is configured to enforce authorized access to the corresponding private key when using PKI-based authentication. If the Central Log Server is not configured to enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.
Fix: F-6739r285682_fix
If using PKI-based authentication, configure the Central Log Server to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000187
- Version
- SRG-APP-000177-AU-002650
- Vuln IDs
-
- V-206480
- V-81363
- Rule IDs
-
- SV-206480r961044_rule
- SV-96077
Checks: C-6740r285684_chk
Examine the configuration. Verify the Central Log Server is configured to map the authenticated identity to the individual user or group account for PKI-based authentication. If the Central Log Server is not configured to map the authenticated identity to the individual user or group account for PKI-based authentication, this is a finding.
Fix: F-6740r285685_fix
Configure the Central Log Server to map the authenticated identity to the individual user or group account for PKI-based authentication.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-AU-002660
- Vuln IDs
-
- V-206481
- V-81291
- Rule IDs
-
- SV-206481r961047_rule
- SV-96005
Checks: C-6741r285687_chk
Examine the configuration. Verify the Central Log Server is configured to obfuscate authentication information during the authentication process so that the authentication is not visible. If the Central Log Server is not configured to obfuscate authentication information during the authentication process so that the authentication is not visible, this is a finding.
Fix: F-6741r285688_fix
Configure the Central Log Server to obfuscate authentication information during the authentication process so that the authentication is not visible to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-AU-002670
- Vuln IDs
-
- V-206482
- V-81295
- Rule IDs
-
- SV-206482r961050_rule
- SV-96009
Checks: C-6742r285690_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-6742r285691_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-APP-000181-AU-000200
- Vuln IDs
-
- V-206483
- V-81129
- Rule IDs
-
- SV-206483r961056_rule
- SV-95843
Checks: C-6743r285693_chk
Examine the configuration. Verify the system is configured to perform audit reduction that supports on-demand reporting requirements. If the Central Log Server is not configured to perform audit reduction that supports on-demand reporting requirements, this is a finding.
Fix: F-6743r285694_fix
Configure the Central Log Server to perform audit reduction that supports on-demand reporting requirements.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000015
- Version
- SRG-APP-000292-AU-000420
- Vuln IDs
-
- V-206484
- V-81131
- Rule IDs
-
- SV-206484r981746_rule
- SV-95845
Checks: C-6744r285696_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage, this is a finding.
Fix: F-6744r285697_fix
Configure the Central Log Server to notify the SA and ISSO when account modification events are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000015
- Version
- SRG-APP-000293-AU-000430
- Vuln IDs
-
- V-206485
- V-81133
- Rule IDs
-
- SV-206485r981747_rule
- SV-95847
Checks: C-6745r285699_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account disabling actions are received, this is a finding.
Fix: F-6745r285700_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account disabling actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000015
- Version
- SRG-APP-000294-AU-000440
- Vuln IDs
-
- V-206486
- V-81135
- Rule IDs
-
- SV-206486r981748_rule
- SV-95849
Checks: C-6746r285702_chk
Note: This is not applicable (NA) if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage. If the Central Log Server does not notify the SA and ISSO when events indicating account removal actions are received, this is a finding.
Fix: F-6746r285703_fix
Configure the Central Log Server to notify the SA and ISSO when events indicating account removal actions are received for all devices and hosts within its scope of coverage.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-AU-000100
- Vuln IDs
-
- V-206491
- V-81145
- Rule IDs
-
- SV-206491r961395_rule
- SV-95859
Checks: C-6751r285714_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load log records onto a different system or media than the system being audited. If the Central Log Server is not configured to off-load log records onto a different system or media than the system being audited, this is a finding.
Fix: F-6751r285715_fix
Configure the Central Log Server to off-load log records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- SRG-APP-000359-AU-000120
- Vuln IDs
-
- V-206492
- V-81147
- Rule IDs
-
- SV-206492r961398_rule
- SV-95861
Checks: C-6752r285717_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to send an immediate warning to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of the repository's maximum log record storage capacity. If the Central Log Server is not configured to send an immediate alert to the SA and ISSO (at a minimum) when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity, this is a finding.
Fix: F-6752r285718_fix
Configure the Central Log Server to send an immediate alert to the SA, ISSO, and other authorized personnel when allocated log record storage volume reaches 75 percent of repository maximum log record storage capacity.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- SRG-APP-000360-AU-000130
- Vuln IDs
-
- V-206493
- V-81149
- Rule IDs
-
- SV-206493r961401_rule
- SV-95863
Checks: C-6753r285720_chk
Examine the configuration. Verify the system is configured to send an alert to the SA and ISSO, within seconds or less, when communication is lost with any host or device within the scope of coverage that may indicate an audit failure. Verify the system is configured to send an alert if hosts and devices stop sending log records to the Central Log Server. If the Central Log Server is not configured to send a real-time alert to the SA and ISSO (at a minimum) of all audit failure events, this is a finding.
Fix: F-6753r285721_fix
For the host and devices within its scope of coverage, configure the Central Log Server to send an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events such as loss of communications with hosts and devices, or if log records are no longer being received.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-000158
- Version
- SRG-APP-000362-AU-000170
- Vuln IDs
-
- V-206495
- V-81153
- Rule IDs
-
- SV-206495r981750_rule
- SV-95867
Checks: C-6755r285726_chk
Examine the configuration. Verify the system is configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-6755r285727_fix
Configure the Central Log Server to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-000158
- Version
- SRG-APP-000363-AU-000180
- Vuln IDs
-
- V-206496
- V-81155
- Rule IDs
-
- SV-206496r981751_rule
- SV-95869
Checks: C-6756r285729_chk
Examine the configuration. Verify the Central Log Server performs on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records. If the Central Log Server is not configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records, this is a finding.
Fix: F-6756r285730_fix
Configure the Central Log Server to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-APP-000364-AU-000190
- Vuln IDs
-
- V-206497
- V-81157
- Rule IDs
-
- SV-206497r961413_rule
- SV-95871
Checks: C-6757r285732_chk
Examine the configuration. Verify the system performs audit reduction that supports on-demand audit review and analysis. If the Central Log Server is not configured to perform audit reduction that supports on-demand audit review and analysis, this is a finding.
Fix: F-6757r285733_fix
Configure the Central Log Server to perform audit reduction that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001877
- Version
- SRG-APP-000365-AU-000210
- Vuln IDs
-
- V-206498
- V-81159
- Rule IDs
-
- SV-206498r961416_rule
- SV-95873
Checks: C-6758r285735_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that supports after-the-fact investigations of security incidents. If the Central Log Server is not configured to perform audit reduction that supports after-the-fact investigations of security incidents, this is a finding.
Fix: F-6758r285736_fix
Configure the Central Log Server to perform audit reduction that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001878
- Version
- SRG-APP-000366-AU-000220
- Vuln IDs
-
- V-206499
- V-81161
- Rule IDs
-
- SV-206499r961419_rule
- SV-95875
Checks: C-6759r285738_chk
Examine the configuration. Verify the Central Log Server generates on-demand audit review and analysis reports. If the Central Log Server is not configured to generate on-demand audit review and analysis reports, this is a finding.
Fix: F-6759r285739_fix
Configure the Central Log Server to generate on-demand audit review and analysis reports.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001879
- Version
- SRG-APP-000367-AU-000230
- Vuln IDs
-
- V-206500
- V-81163
- Rule IDs
-
- SV-206500r961422_rule
- SV-95877
Checks: C-6760r285741_chk
Examine the configuration. Verify the Central Log Server generates reports that support on-demand reporting requirements. If the Central Log Server is not configured to generate reports that support on-demand reporting requirements, this is a finding.
Fix: F-6760r285742_fix
Configure the Central Log Server to generate reports that support on-demand reporting requirements.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001880
- Version
- SRG-APP-000368-AU-000240
- Vuln IDs
-
- V-206501
- V-81165
- Rule IDs
-
- SV-206501r961425_rule
- SV-95879
Checks: C-6761r285744_chk
Examine the configuration. Verify the Central Log Server generates reports that support after-the-fact investigations of security incidents. If the Central Log Server is not configured to generate reports that support after-the-fact investigations of security incidents, this is a finding.
Fix: F-6761r285745_fix
Configure the Central Log Server to generate reports that support after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001881
- Version
- SRG-APP-000369-AU-000250
- Vuln IDs
-
- V-206502
- V-81167
- Rule IDs
-
- SV-206502r961428_rule
- SV-95881
Checks: C-6762r285747_chk
Examine the configuration. Verify the Central Log Server performs audit reduction that does not alter original content or time ordering of log records. If the Central Log Server is not configured to perform audit reduction that does not alter original content or time ordering of log records, this is a finding.
Fix: F-6762r285748_fix
Configure the Central Log Server to perform audit reduction that does not alter original content or time ordering of log records.
- RMF Control
- AU-7
- Severity
- L
- CCI
- CCI-001882
- Version
- SRG-APP-000370-AU-000260
- Vuln IDs
-
- V-206503
- V-81169
- Rule IDs
-
- SV-206503r961431_rule
- SV-95883
Checks: C-6763r285750_chk
Examine the configuration. Verify the Central Log Server generates reports that do not alter original content or time ordering of log records. If the Central Log Server is not configured to generate reports that do not alter original content or time ordering of log records, this is a finding.
Fix: F-6763r285751_fix
Configure the Central Log Server to generate reports that do not alter original content or time ordering of log records.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001890
- Version
- SRG-APP-000374-AU-000290
- Vuln IDs
-
- V-206504
- V-81171
- Rule IDs
-
- SV-206504r961443_rule
- SV-95885
Checks: C-6764r285753_chk
Examine the log records stored on the events server. Verify the Central Log Server records time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC. If the Central Log Server is not configured to record time stamps of the time the record was received or the time stamp is not mapped to UTC, this is a finding.
Fix: F-6764r285754_fix
Configure the Central Log Server to record time stamps of the time the record was received from the host or device. Verify the time stamp is mapped to UTC.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001889
- Version
- SRG-APP-000375-AU-000280
- Vuln IDs
-
- V-206505
- V-81173
- Rule IDs
-
- SV-206505r961446_rule
- SV-95887
Checks: C-6765r285756_chk
Examine the configuration. Verify the Central Log Server records time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision. If the Central Log Server is not configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision, this is a finding.
Fix: F-6765r285757_fix
Configure the Central Log Server to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-APP-000391-AU-002290
- Vuln IDs
-
- V-206506
- V-81323
- Rule IDs
-
- SV-206506r961494_rule
- SV-96037
Checks: C-6766r285759_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credential to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credential to support identity management and personal authentication, this is a finding.
Fix: F-6766r285760_fix
Configure the Central Log Server to accept the DoD CAC credential to support identity management and personal authentication.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-APP-000392-AU-002300
- Vuln IDs
-
- V-206507
- V-81327
- Rule IDs
-
- SV-206507r961497_rule
- SV-96041
Checks: C-6767r285762_chk
Examine the configuration. Verify the Central Log Server is configured to accept the DoD CAC credentials to support identity management and personal authentication. If the Central Log Server cannot be configured to accept the DoD CAC credentials to support identity management and personal authentication, this is a finding.
Fix: F-6767r285763_fix
Configure the Central Log Server to accept the DoD CAC credentials to support identity management and personal authentication.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-AU-004310
- Vuln IDs
-
- V-206509
- V-81301
- Rule IDs
-
- SV-206509r961632_rule
- SV-96015
Checks: C-6769r285768_chk
Examine the configuration. Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function. If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.
Fix: F-6769r285769_fix
Configure the Central Log Server to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000514-AU-002890
- Vuln IDs
-
- V-206510
- V-81303
- Rule IDs
-
- SV-206510r961857_rule
- SV-96017
Checks: C-6770r285771_chk
Examine the configuration. Verify the Central Log Server is configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If the Central Log Server is not configured to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-6770r285772_fix
Configure the Central Log Server to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001851
- Version
- SRG-APP-000515-AU-000110
- Vuln IDs
-
- V-206511
- V-81177
- Rule IDs
-
- SV-206511r961860_rule
- SV-95891
Checks: C-6771r285774_chk
Note: This is not applicable (NA) if an external application or operating system manages this function. Examine the configuration. Verify the system is configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum. If the Central Log Server is not configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum, this is a finding.
Fix: F-6771r285775_fix
Configure the Central Log Server to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000330
- Vuln IDs
-
- V-206512
- V-81179
- Rule IDs
-
- SV-206512r961863_rule
- SV-95893
Checks: C-6772r285777_chk
Examine the configuration. Verify the Central Log Server is configured to include the identity of the original source host or device where the event occurred as part of each aggregated log record. If the Central Log Server is not configured to include the identity of the original source host or device where the event occurred as part of the aggregated log record, this is a finding.
Fix: F-6772r285778_fix
Configure the Central Log Server to include the identity of the original source host or device as part of each aggregated log record.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000340
- Vuln IDs
-
- V-206513
- V-81181
- Rule IDs
-
- SV-206513r961863_rule
- SV-95895
Checks: C-6773r285780_chk
Examine the configuration. Verify the Central Log Server is configured to use TCP. If the Central Log Server is not configured to use TCP, this is a finding.
Fix: F-6773r285781_fix
Configure the Central Log Server that aggregates log records from hosts and devices to use TCP for transmission.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000350
- Vuln IDs
-
- V-206514
- V-81183
- Rule IDs
-
- SV-206514r961863_rule
- SV-95897
Checks: C-6774r285783_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog, SIEM) does not perform analysis. This is NA if notifications are performed by another device. Examine the configuration. Verify the Central Log Server is configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage. If the Central Log Server is not configured to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage, this is a finding.
Fix: F-6774r285784_fix
Configure the Central Log Server to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000360
- Vuln IDs
-
- V-206515
- V-81185
- Rule IDs
-
- SV-206515r961863_rule
- SV-95899
Checks: C-6775r285786_chk
Note: This is not applicable (NA) if the Central Log Server (e.g., syslog) does not perform analysis. Examine the configuration. Verify the Central Log Server automatically creates trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds). If the Central Log Server is not configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds), this is a finding.
Fix: F-6775r285787_fix
Configure the Central Log Server to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000370
- Vuln IDs
-
- V-206516
- V-81187
- Rule IDs
-
- SV-206516r961863_rule
- SV-95901
Checks: C-6776r285789_chk
Examine the configuration. Verify the Central Log Server automatically aggregates events that indicate account actions for each device and host within its scope of coverage. If the Central Log Server is not configured to automatically aggregate events that indicate account actions for each device and host within its scope of coverage, this is a finding.
Fix: F-6776r285790_fix
Configure the Central Log Server to automatically aggregate events that indicate account actions for each device and host within its scope of coverage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000380
- Vuln IDs
-
- V-206517
- V-81189
- Rule IDs
-
- SV-206517r961863_rule
- SV-95903
Checks: C-6777r285792_chk
Obtain the site’s SSP to see which criticality levels are used for each system within the scope of the Central Log Server. Examine the configuration of the Central Log Server. Verify the Central Log Server is configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts. If the Central Log Server is not configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts, this is a finding.
Fix: F-6777r285793_fix
Configure the Central Log Server with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000410
- Vuln IDs
-
- V-206518
- V-81191
- Rule IDs
-
- SV-206518r961863_rule
- SV-95905
Checks: C-6778r285795_chk
Examine the configuration. Verify analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are configured to comply with DoD-trusted path and access requirements. If analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are not configured to comply with DoD-trusted path and access requirements, this is a finding.
Fix: F-6778r285796_fix
Configure all analysis, viewing, and indexing functions, services, and applications used with the Central Log Server to comply with DoD-trusted path and access requirements.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-APP-000026-AU-000580
- Vuln IDs
-
- V-221900
- V-100025
- Rule IDs
-
- SV-221900r960777_rule
- SV-109129
Checks: C-23615r420042_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account creation. If the Central Log Server is not configured to automatically audit account creation, this is a finding.
Fix: F-23604r420043_fix
Configure the Central Log Server to automatically audit account creation.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-APP-000027-AU-000590
- Vuln IDs
-
- V-221901
- V-100027
- Rule IDs
-
- SV-221901r960780_rule
- SV-109131
Checks: C-23616r420045_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account modification. If the Central Log Server is not configured to automatically audit account modification, this is a finding.
Fix: F-23605r420046_fix
Configure the Central Log Server to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-APP-000028-AU-000600
- Vuln IDs
-
- V-221902
- V-100029
- Rule IDs
-
- SV-221902r960783_rule
- SV-109133
Checks: C-23617r420048_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account disabling. If the Central Log Server is not configured to automatically audit account disabling, this is a finding.
Fix: F-23606r420049_fix
Configure the Central Log Server to automatically audit account disabling.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-APP-000029-AU-000610
- Vuln IDs
-
- V-221903
- V-100031
- Rule IDs
-
- SV-221903r960786_rule
- SV-109135
Checks: C-23618r420051_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically audit account removal. If the Central Log Server is not configured to automatically audit account removal, this is a finding.
Fix: F-23607r420052_fix
Configure the Central Log Server to automatically audit account removal.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-APP-000065-AU-000240
- Vuln IDs
-
- V-221904
- V-100033
- Rule IDs
-
- SV-221904r960840_rule
- SV-109137
Checks: C-23619r420054_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account after 3 consecutive invalid attempts during a 15 minute period. If the Central Log Server is not configured to lock out the account after 3 consecutive invalid attempts in 15 minutes, this is a finding.
Fix: F-23608r420055_fix
Configure the Central Log Server to lock out the account after 3 consecutive invalid attempts during a 15 minute period.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SRG-APP-000068-AU-000035
- Vuln IDs
-
- V-221905
- V-100037
- Rule IDs
-
- SV-221905r960843_rule
- SV-109141
Checks: C-23620r420057_chk
Examine the configuration. Verify that the Central Log Server is configured to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server. If the Central Log Server is not configured to display the Mandatory DoD Notice and Consent Banner, this is a finding.
Fix: F-23609r420058_fix
Configure the Central Log Server to display the Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- SRG-APP-000069-AU-000420
- Vuln IDs
-
- V-221906
- V-100039
- Rule IDs
-
- SV-221906r960846_rule
- SV-109143
Checks: C-23621r420060_chk
Examine the configuration. Verify that the Central Log Server is configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions. If the Central Log Server is not configured to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions, this is a finding.
Fix: F-23610r420061_fix
Configure the Central Log Server to retain the Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions.
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001464
- Version
- SRG-APP-000092-AU-000670
- Vuln IDs
-
- V-221907
- V-100043
- Rule IDs
-
- SV-221907r960888_rule
- SV-109147
Checks: C-23622r420063_chk
Examine the configuration. Verify that the Central Log Server initiates session logging upon startup. If the Central Log Server is not configured to initiate session logging upon startup, this is a finding.
Fix: F-23611r420064_fix
Configure the Central Log Server to initiate session logging upon startup.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SRG-APP-000095-AU-000680
- Vuln IDs
-
- V-221908
- V-100045
- Rule IDs
-
- SV-221908r960891_rule
- SV-109149
Checks: C-23623r420066_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish what type of events occurred. If the Central Log Server is not configured to produce audit records containing information to establish what type of events occurred, this is a finding.
Fix: F-23612r420067_fix
Configure the Central Log Server to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- SRG-APP-000096-AU-000690
- Vuln IDs
-
- V-221909
- V-100047
- Rule IDs
-
- SV-221909r960894_rule
- SV-109151
Checks: C-23624r420069_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish when the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish when the events occurred, this is a finding.
Fix: F-23613r420070_fix
Configure the Central Log Server to produce audit records containing information to establish when the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- SRG-APP-000097-AU-000700
- Vuln IDs
-
- V-221910
- V-100049
- Rule IDs
-
- SV-221910r960897_rule
- SV-109153
Checks: C-23625r420072_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish where the events occurred. If the Central Log Server is not configured to produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-23614r420073_fix
Configure the Central Log Server to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-APP-000098-AU-000710
- Vuln IDs
-
- V-221911
- V-100051
- Rule IDs
-
- SV-221911r960900_rule
- SV-109155
Checks: C-23626r420075_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the source of the events. If the Central Log Server is not configured to produce audit records containing information to establish the source of the events, this is a finding.
Fix: F-23615r420076_fix
Configure the Central Log Server to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- SRG-APP-000099-AU-000720
- Vuln IDs
-
- V-221912
- V-100053
- Rule IDs
-
- SV-221912r960903_rule
- SV-109157
Checks: C-23627r420078_chk
Examine the configuration. Verify that the Central Log Server produces audit records containing information to establish the outcome of the events. If the Central Log Server is not configured to produce audit records containing information to establish the outcome of the events, this is a finding.
Fix: F-23616r420079_fix
Configure the Central Log Server to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001487
- Version
- SRG-APP-000100-AU-000730
- Vuln IDs
-
- V-221913
- V-100055
- Rule IDs
-
- SV-221913r960906_rule
- SV-109159
Checks: C-23628r420081_chk
The Central Log Server must generate audit records containing information that establishes the identity of any individual or process associated with the event.
Fix: F-23617r420082_fix
Configure the Central Log Server to produce audit records containing information to establish the identity of the individual or process associated with the event.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-AU-000100
- Vuln IDs
-
- V-221914
- V-100057
- Rule IDs
-
- SV-221914r960930_rule
- SV-109161
Checks: C-23629r420084_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized read access. If the Central Log Server is not configured to protect audit information from any unauthorized read access, this is a finding.
Fix: F-23618r420085_fix
Configure the Central Log Server to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-AU-000110
- Vuln IDs
-
- V-221915
- V-100059
- Rule IDs
-
- SV-221915r960933_rule
- SV-109163
Checks: C-23630r420087_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from any unauthorized modification. If the Central Log Server is not configured to protect audit information from any unauthorized modification, this is a finding.
Fix: F-23619r420088_fix
Configure the Central Log Server to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-AU-000120
- Vuln IDs
-
- V-221916
- V-100061
- Rule IDs
-
- SV-221916r960936_rule
- SV-109165
Checks: C-23631r420090_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit information from unauthorized deletion. If the Central Log Server is not configured to protect audit information from unauthorized deletion, this is a finding.
Fix: F-23620r420091_fix
Configure the Central Log Server to protect audit information from unauthorized deletion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-AU-000130
- Vuln IDs
-
- V-221917
- V-100063
- Rule IDs
-
- SV-221917r960939_rule
- SV-109167
Checks: C-23632r420093_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized access. If the Central Log Server is not configured to protect audit tools from unauthorized access, this is a finding.
Fix: F-23621r420094_fix
Configure the Central Log Server to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-AU-000140
- Vuln IDs
-
- V-221918
- V-100065
- Rule IDs
-
- SV-221918r960942_rule
- SV-109169
Checks: C-23633r420096_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized modification. If the Central Log Server is not configured to protect audit tools from unauthorized modification, this is a finding.
Fix: F-23622r420097_fix
Configure the Central Log Server to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-AU-000150
- Vuln IDs
-
- V-221919
- V-100067
- Rule IDs
-
- SV-221919r960945_rule
- SV-109171
Checks: C-23634r420099_chk
Examine the configuration. Verify that the Central Log Server is configured to protect audit tools from unauthorized deletion. If the Central Log Server is not configured to protect audit tools from unauthorized deletion, this is a finding.
Fix: F-23623r420100_fix
Configure the Central Log Server to protect audit tools from unauthorized deletion.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-AU-000090
- Vuln IDs
-
- V-221920
- V-100069
- Rule IDs
-
- SV-221920r960963_rule
- SV-109173
Checks: C-23635r420102_chk
Examine the configuration. Verify that the Central Log Server is configured to disable non-essential capabilities. If the Central Log Server is not configured to disable non-essential capabilities, this is a finding.
Fix: F-23624r420103_fix
Configure the Central Log Server to disable non-essential capabilities.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000015
- Version
- SRG-APP-000291-AU-000200
- Vuln IDs
-
- V-221921
- V-100021
- Rule IDs
-
- SV-221921r981745_rule
- SV-109125
Checks: C-23636r420105_chk
Examine the configuration. Verify that the Central Log Server is configured to notify system administrators and the ISSO when accounts are created. If the Central Log Server is not configured to notify system administrators and ISSO when accounts are created, this is a finding.
Fix: F-23625r420106_fix
Configure the Central Log Server to notify system administrators and the ISSO when accounts are created.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-AU-000190
- Vuln IDs
-
- V-221922
- V-100015
- Rule IDs
-
- SV-221922r1043182_rule
- SV-109119
Checks: C-23637r420108_chk
Examine the configuration. Verify that the Central Log Server is configured to automatically terminate a user session after organization-defined conditions or trigger events. If the Central Log Server is not configured to automatically terminate a user session after organization-defined conditions or trigger events, this is a finding.
Fix: F-23626r420109_fix
Configure the Central Log Server to automatically terminate a user session after organization-defined conditions or trigger events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-AU-000560
- Vuln IDs
-
- V-221923
- V-100017
- Rule IDs
-
- SV-221923r961224_rule
- SV-109121
Checks: C-23638r420111_chk
Examine the configuration. Verify that the Central Log Server provides a logout capability for user initiated sessions. If the Central Log Server does not provide a logout capability for user initiated sessions, this is a finding.
Fix: F-23627r420112_fix
Configure the Central Log Server to provide a logout capability for user initiated sessions.
- RMF Control
- AC-12
- Severity
- L
- CCI
- CCI-002364
- Version
- SRG-APP-000297-AU-000570
- Vuln IDs
-
- V-221924
- V-100019
- Rule IDs
-
- SV-221924r961227_rule
- SV-109123
Checks: C-23639r420114_chk
Examine the configuration. Verify that the Central Log Server is configured to display an explicit logout message to users indicating the reliable termination of authenticated sessions. If the Central Log Server is not configured to display an explicit logout message to users, it is a finding.
Fix: F-23628r420115_fix
Configure the Central Log Server to display an explicit logout message to users indicating the reliable termination of authenticated sessions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-APP-000345-AU-000400
- Vuln IDs
-
- V-221925
- V-100035
- Rule IDs
-
- SV-221925r961368_rule
- SV-109139
Checks: C-23640r420117_chk
Examine the configuration. Verify that the Central Log Server is configured to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded. If the Central Log Server is not configured to lock out the account until released by an administrator when 3 consecutive invalid attempts in 15 minutes is exceeded, this is a finding.
Fix: F-23629r420118_fix
Configure the Central Log Server to lock out the account until released by an administrator when 3 consecutive invalid attempts during a 15 minute period is exceeded.
- RMF Control
- IA-11
- Severity
- L
- CCI
- CCI-002038
- Version
- SRG-APP-000389-AU-000180
- Vuln IDs
-
- V-221926
- V-100071
- Rule IDs
-
- SV-221926r1050786_rule
- SV-109175
Checks: C-23641r420120_chk
Examine the configuration. Verify the Central Log Server requires users to reauthenticate when situations require reauthentication. If the Central Log Server is not configured to reauthenticate when necessary, this is a finding.
Fix: F-23630r420121_fix
Configure the Central Log Server to reauthenticate users when situations require reauthentication.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-AU-000040
- Vuln IDs
-
- V-221927
- V-100075
- Rule IDs
-
- SV-221927r961596_rule
- SV-109179
Checks: C-23642r420123_chk
Examine the configuration. Verify the Central Log Server is configured to only allow the use of DoD PKI certificate authorities. If the Central Log Server is not configured to only allow DoD PKI certificate authorities, this is a finding.
Fix: F-23631r420124_fix
Configure the Central Log Server to only allow the use of DoD PKI certificate authorities.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-AU-000280
- Vuln IDs
-
- V-221928
- V-100041
- Rule IDs
-
- SV-221928r961824_rule
- SV-109145
Checks: C-23643r420126_chk
Examine the configuration. Verify that the Central Log Server generates audit records when successful/unsuccessful logon attempts occur. If the Central Log Server is not configured to generate audit records when successful/unsuccessful logon attempts occur, this is a finding.
Fix: F-23632r420127_fix
Configure the Central Log Server to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000610-AU-000050
- Vuln IDs
-
- V-221929
- V-100073
- Rule IDs
-
- SV-221929r961896_rule
- SV-109177
Checks: C-23644r420129_chk
Examine the configuration. Verify the Central Log Server is configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the Central Log Server is not configured to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-23633r531239_fix
Configure the Central Log Server to use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- SRG-APP-000095-AU-000050
- Vuln IDs
-
- V-241819
- V-81137
- Rule IDs
-
- SV-241819r960891_rule
- SV-95851
Checks: C-45095r695400_chk
Examine the configuration. Verify the SA and ISSM have been assigned the privileges needed to allow these roles to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Verify the retention configuration for each host and device is in compliance with the documented organization criteria, including the identified criticality level, event type, and/or retention period. If the Central Log Server is not configured to allow the SA and ISSM to change the retention of the log records, this is a finding. If the retention is not in compliance with the organization’s documentation, this is a finding.
Fix: F-45054r695401_fix
Configure the Central Log Server with the privileges needed to allow the SA and ISSM to change the level and type of log records that are retained in the centralized repository based on any selectable event criteria. Based on the documented requirements for each application, configure the events server to retain log records based on criticality level, type of event, and/or retention period, at a minimum.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SRG-APP-000516-AU-000060
- Vuln IDs
-
- V-241820
- V-81139
- Rule IDs
-
- SV-241820r961863_rule
- SV-95853
Checks: C-45096r695403_chk
Examine the configuration. Verify the system is configured so changes made to the level and type of log records stored in the centralized repository take effect immediately without the need to reboot or restart the application. If the Central Log Server is not configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application, this is a finding.
Fix: F-45055r695404_fix
Configure the Central Log Server so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-AU-000110
- Vuln IDs
-
- V-263557
- Rule IDs
-
- SV-263557r981756_rule
Checks: C-67457r981754_chk
Verify the Central Log Server is configured to disable accounts when the accounts are no longer associated to a user. If the Central Log Server is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67365r981755_fix
Configure the Central Log Server to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003821
- Version
- SRG-APP-000745-AU-000120
- Vuln IDs
-
- V-263558
- Rule IDs
-
- SV-263558r982403_rule
Checks: C-67458r982402_chk
Verify the Central Log Server is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the Central Log Server is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Fix: F-67366r981758_fix
Configure the Central Log Server to implement the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- Severity
- M
- CCI
- CCI-003822
- Version
- SRG-APP-000750-AU-000130
- Vuln IDs
-
- V-263559
- Rule IDs
-
- SV-263559r982405_rule
Checks: C-67459r982404_chk
Verify the Central Log Server is configured to implement an audit reduction capability that supports on-demand audit review and analysis. If the Central Log Server is not configured to implement an audit reduction capability that supports on-demand audit review and analysis, this is a finding.
Fix: F-67367r981761_fix
Configure the Central Log Server to implement an audit reduction capability that supports on-demand audit review and analysis.
- RMF Control
- Severity
- M
- CCI
- CCI-003823
- Version
- SRG-APP-000755-AU-000140
- Vuln IDs
-
- V-263560
- Rule IDs
-
- SV-263560r982407_rule
Checks: C-67460r982406_chk
Verify the Central Log Server is configured to implement an audit reduction capability that supports on-demand reporting requirements. If the Central Log Server is not configured to implement an audit reduction capability that supports on-demand reporting requirements, this is a finding.
Fix: F-67368r981764_fix
Configure the Central Log Server to implement an audit reduction capability that supports on-demand reporting requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-003824
- Version
- SRG-APP-000760-AU-000150
- Vuln IDs
-
- V-263561
- Rule IDs
-
- SV-263561r982409_rule
Checks: C-67461r982408_chk
Verify the Central Log Server is configured to implement an audit reduction capability that supports after-the-fact investigations of incidents. If the Central Log Server is not configured to implement an audit reduction capability that supports after-the-fact investigations of incidents, this is a finding.
Fix: F-67369r981767_fix
Configure the Central Log Server to implement an audit reduction capability that supports after-the-fact investigations of incidents.
- RMF Control
- Severity
- M
- CCI
- CCI-003825
- Version
- SRG-APP-000765-AU-000160
- Vuln IDs
-
- V-263562
- Rule IDs
-
- SV-263562r982411_rule
Checks: C-67462r982410_chk
Verify the Central Log Server is configured to implement a report generation capability that supports on-demand audit review and analysis. If the Central Log Server is not configured to implement a report generation capability that supports on-demand audit review and analysis, this is a finding.
Fix: F-67370r981770_fix
Configure the Central Log Server to implement a report generation capability that supports on-demand audit review and analysis.
- RMF Control
- Severity
- M
- CCI
- CCI-003826
- Version
- SRG-APP-000770-AU-000170
- Vuln IDs
-
- V-263563
- Rule IDs
-
- SV-263563r982413_rule
Checks: C-67463r982412_chk
Verify the Central Log Server is configured to implement a report generation capability that supports on-demand reporting requirements. If the Central Log Server is not configured to implement a report generation capability that supports on-demand reporting requirements, this is a finding.
Fix: F-67371r981773_fix
Configure the Central Log Server to implement a report generation capability that supports on-demand reporting requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-003827
- Version
- SRG-APP-000775-AU-000180
- Vuln IDs
-
- V-263564
- Rule IDs
-
- SV-263564r982415_rule
Checks: C-67464r982414_chk
Verify the Central Log Server is configured to implement a report generation capability that supports after-the-fact investigations of incidents. If the Central Log Server is not configured to implement a report generation capability that supports after-the-fact investigations of incidents, this is a finding.
Fix: F-67372r981776_fix
Configure the Central Log Server to implement a report generation capability that supports after-the-fact investigations of incidents.
- RMF Control
- Severity
- M
- CCI
- CCI-003828
- Version
- SRG-APP-000780-AU-000190
- Vuln IDs
-
- V-263565
- Rule IDs
-
- SV-263565r982417_rule
Checks: C-67465r982416_chk
Verify the Central Log Server is configured to implement an audit reduction capability that does not alter original content or time ordering of audit records. If the Central Log Server is not configured to implement an audit reduction capability that does not alter original content or time ordering of audit records, this is a finding.
Fix: F-67373r981779_fix
Configure the Central Log Server to implement an audit reduction capability that does not alter original content or time ordering of audit records.
- RMF Control
- Severity
- M
- CCI
- CCI-003829
- Version
- SRG-APP-000785-AU-000200
- Vuln IDs
-
- V-263566
- Rule IDs
-
- SV-263566r982419_rule
Checks: C-67466r982418_chk
Verify the Central Log Server is configured to implement a report generation capability that does not alter original content or time ordering of audit records. If the Central Log Server is not configured to implement a report generation capability that does not alter original content or time ordering of audit records, this is a finding.
Fix: F-67374r981782_fix
Configure the Central Log Server to implement a report generation capability that does not alter original content or time ordering of audit records.
- RMF Control
- Severity
- M
- CCI
- CCI-003830
- Version
- SRG-APP-000790-AU-000210
- Vuln IDs
-
- V-263567
- Rule IDs
-
- SV-263567r982421_rule
Checks: C-67467r982420_chk
Verify the Central Log Server is configured to implement the capability to process, sort, and search audit records for events of interest based on organization-defined audit fields within audit records. If the Central Log Server is not configured to implement the capability to process, sort, and search audit records for events of interest based on organization-defined audit fields within audit records, this is a finding.
Fix: F-67375r981785_fix
Configure the Central Log Server to implement the capability to process, sort, and search audit records for events of interest based on organization-defined audit fields within audit records.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-AU-000220
- Vuln IDs
-
- V-263568
- Rule IDs
-
- SV-263568r982423_rule
Checks: C-67468r982422_chk
Verify the Central Log Server is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the Central Log Server is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-67376r981788_fix
Configure the Central Log Server to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-003834
- Version
- SRG-APP-000800-AU-000230
- Vuln IDs
-
- V-263569
- Rule IDs
-
- SV-263569r982425_rule
Checks: C-67469r982424_chk
Verify the Central Log Server is configured to implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds. If the Central Log Server is not configured to implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds, this is a finding.
Fix: F-67377r981791_fix
Configure the Central Log Server to implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000805-AU-000240
- Vuln IDs
-
- V-263570
- Rule IDs
-
- SV-263570r982427_rule
Checks: C-67470r982426_chk
Verify the Central Log Server is configured to automatically generate audit records of the enforcement actions. If the Central Log Server is not configured to automatically generate audit records of the enforcement actions, this is a finding.
Fix: F-67378r981794_fix
Configure the Central Log Server to automatically generate audit records of the enforcement actions.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000810-AU-000250
- Vuln IDs
-
- V-263571
- Rule IDs
-
- SV-263571r982429_rule
Checks: C-67471r982428_chk
Verify the Central Log Server is configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization. If the Central Log Server is not configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-67379r981797_fix
Configure the Central Log Server to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000815-AU-000260
- Vuln IDs
-
- V-263572
- Rule IDs
-
- SV-263572r982431_rule
Checks: C-67472r982430_chk
Verify the Central Log Server is configured to require users to be individually authenticated before granting access to the shared accounts or resources. If the Central Log Server is not configured to require users to be individually authenticated before granting access to the shared accounts or resources, this is a finding.
Fix: F-67380r981800_fix
Configure the Central Log Server to require users to be individually authenticated before granting access to the shared accounts or resources.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-AU-000280
- Vuln IDs
-
- V-263573
- Rule IDs
-
- SV-263573r982433_rule
Checks: C-67473r982432_chk
Verify the Central Log Server is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the Central Log Server is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67381r981803_fix
Configure the Central Log Server to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-AU-000290
- Vuln IDs
-
- V-263574
- Rule IDs
-
- SV-263574r981807_rule
Checks: C-67474r981805_chk
Verify the Central Log Server is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the Central Log Server is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-67382r981806_fix
Configure the Central Log Server to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-AU-000300
- Vuln IDs
-
- V-263575
- Rule IDs
-
- SV-263575r982435_rule
Checks: C-67475r982434_chk
Verify the Central Log Server is configured to update the list of passwords on an organization-defined frequency. If the Central Log Server is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-67383r981809_fix
Configure the Central Log Server to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-AU-000310
- Vuln IDs
-
- V-263576
- Rule IDs
-
- SV-263576r982437_rule
Checks: C-67476r982436_chk
Verify the Central Log Server is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the Central Log Server is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-67384r981812_fix
Configure the Central Log Server to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-AU-000320
- Vuln IDs
-
- V-263577
- Rule IDs
-
- SV-263577r981816_rule
Checks: C-67477r981814_chk
Verify the Central Log Server is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the Central Log Server is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67385r981815_fix
Configure the Central Log Server to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-AU-000340
- Vuln IDs
-
- V-263578
- Rule IDs
-
- SV-263578r982439_rule
Checks: C-67478r982438_chk
Verify the Central Log Server is configured to require immediate selection of a new password upon account recovery. If the Central Log Server is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-67386r981818_fix
Configure the Central Log Server to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-AU-000350
- Vuln IDs
-
- V-263579
- Rule IDs
-
- SV-263579r982441_rule
Checks: C-67479r982440_chk
Verify the Central Log Server is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the Central Log Server is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-67387r981821_fix
Configure the Central Log Server to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-AU-000360
- Vuln IDs
-
- V-263580
- Rule IDs
-
- SV-263580r982443_rule
Checks: C-67480r982442_chk
Verify the Central Log Server is configured to employ automated tools to assist the user in selecting strong password authenticators. If the Central Log Server is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-67388r981824_fix
Configure the Central Log Server to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-AU-000380
- Vuln IDs
-
- V-263581
- Rule IDs
-
- SV-263581r981828_rule
Checks: C-67481r981826_chk
Verify the Central Log Server is configured to implement a local cache of revocation data to support path discovery and validation. If the Central Log Server is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-67389r981827_fix
Configure the Central Log Server to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-AU-000390
- Vuln IDs
-
- V-263582
- Rule IDs
-
- SV-263582r982445_rule
Checks: C-67482r982444_chk
Verify the Central Log Server is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the Central Log Server is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67390r981830_fix
Configure the Central Log Server to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-AU-000400
- Vuln IDs
-
- V-263583
- Rule IDs
-
- SV-263583r982447_rule
Checks: C-67483r982446_chk
Verify the Central Log Server is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the Central Log Server is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67391r981833_fix
Configure the Central Log Server to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-AU-000410
- Vuln IDs
-
- V-263584
- Rule IDs
-
- SV-263584r982449_rule
Checks: C-67484r982448_chk
Verify the Central Log Server is configured to synchronize system clocks within and between systems or system components. If the Central Log Server is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67392r981836_fix
Configure the Central Log Server to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000925-AU-000420
- Vuln IDs
-
- V-263585
- Rule IDs
-
- SV-263585r982451_rule
Checks: C-67485r982450_chk
Verify the Central Log Server is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the Central Log Server is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Fix: F-67393r981839_fix
Configure the Central Log Server to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.