STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

DISA Rule

SV-109119r1_rule

Vulnerability Number

V-100015

Group Title

SRG-APP-000295-AU-000190

Rule Version

SRG-APP-000295-AU-000190

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Central Log Server to automatically terminate a user session after organization-defined conditions or trigger events.

Check Contents

Examine the configuration.

Verify that the Central Log Server is configured to automatically terminate a user session after organization-defined conditions or trigger events.

If the Central Log Server is not configured to automatically terminate a user session after organization-defined conditions or trigger events, this is a finding.

Vulnerability Number

V-100015

Documentable

False

Rule Version

SRG-APP-000295-AU-000190

Severity Override Guidance

Examine the configuration.

Verify that the Central Log Server is configured to automatically terminate a user session after organization-defined conditions or trigger events.

If the Central Log Server is not configured to automatically terminate a user session after organization-defined conditions or trigger events, this is a finding.

Check Content Reference

M

Target Key

3395

Comments