STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must provide centralized management and configuration of the content to be captured in audit records generated by all application components.

DISA Rule

SV-222480r508029_rule

Vulnerability Number

V-222480

Group Title

SRG-APP-000356

Rule Version

APSC-DV-001050

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application to utilize a centralized log management system that provides the capability to configure the content of audit records.

Check Contents

Review the application documentation and interview the application administrator to determine the logging architecture of the application.

If the application is configured to log application event entries to a centralized, enterprise based logging solution that meets this requirement, the requirement is not applicable.

Review the application components and the log management capabilities of the application.

Verify the application log management interface includes the ability to centrally manage the configuration of what is captured in the logs of all application components.

If the application does not provide the ability to centrally manage the content captured in the audit logs, this is a finding.

Vulnerability Number

V-222480

Documentable

False

Rule Version

APSC-DV-001050

Severity Override Guidance

Review the application documentation and interview the application administrator to determine the logging architecture of the application.

If the application is configured to log application event entries to a centralized, enterprise based logging solution that meets this requirement, the requirement is not applicable.

Review the application components and the log management capabilities of the application.

Verify the application log management interface includes the ability to centrally manage the configuration of what is captured in the logs of all application components.

If the application does not provide the ability to centrally manage the content captured in the audit logs, this is a finding.

Check Content Reference

M

Target Key

4093

Comments