STIGQter STIGQter: STIG Summary: JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

File permissions must be configured to protect log information from unauthorized modification.

DISA Rule

SV-213514r615939_rule

Vulnerability Number

V-213514

Group Title

SRG-APP-000119-AS-000079

Rule Version

JBOS-AS-000170

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the OS file permissions on the application server to protect log information from unauthorized modification.

Check Contents

Examine the log file locations and inspect the file permissions. Interview the system admin to determine log file locations. The default location for the log files is:

Standalone configuration:
<JBOSS_HOME>/standalone/log/

Managed Domain configuration:
<JBOSS_HOME>/domain/servers/<servername>/log/
<JBOSS_HOME>/domain/log/

Review the file permissions for the log file directories. The method used for identifying file permissions will be based upon the OS the EAP server is installed on.

Identify all users with file permissions that allow them to modify log files.

Request documentation from system admin that identifies the users who are authorized to modify log files.

If unauthorized users are allowed to modify log files, or if documentation that identifies the users who are authorized to modify log files is missing, this is a finding.

Vulnerability Number

V-213514

Documentable

False

Rule Version

JBOS-AS-000170

Severity Override Guidance

Examine the log file locations and inspect the file permissions. Interview the system admin to determine log file locations. The default location for the log files is:

Standalone configuration:
<JBOSS_HOME>/standalone/log/

Managed Domain configuration:
<JBOSS_HOME>/domain/servers/<servername>/log/
<JBOSS_HOME>/domain/log/

Review the file permissions for the log file directories. The method used for identifying file permissions will be based upon the OS the EAP server is installed on.

Identify all users with file permissions that allow them to modify log files.

Request documentation from system admin that identifies the users who are authorized to modify log files.

If unauthorized users are allowed to modify log files, or if documentation that identifies the users who are authorized to modify log files is missing, this is a finding.

Check Content Reference

M

Target Key

3987

Comments