STIGQter STIGQter: STIG Summary: Trend Micro Deep Security 9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 26 Feb 2016:

Trend Deep Security must protect audit information from unauthorized modification.

DISA Rule

SV-80379r1_rule

Vulnerability Number

V-65889

Group Title

SRG-APP-000119

Rule Version

TMDS-00-000095

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Trend Deep Security server to protect audit information from unauthorized modification.

Edit the audit permission according the local policy by modifying the roles under:

Administration >> User Management >> Roles
Select the applicable role.
Click "Computer Rights" to modify user permissions.
Next select “Other Rights” and modify accordingly.

Check Contents

Review the Trend Deep Security server configuration to ensure audit information is protected from unauthorized modification.

Interview the ISSO in order to identify all users and their permissions to the audit records. The ISSO must identify each user along with their assigned role configured for the appropriate information systems allowed.

Verify the information gathered against the application's, "Computer and Group Rights" for each "Role" created along with the users assigned.

If the information gathered does not match the settings within the application this is a finding.

Vulnerability Number

V-65889

Documentable

False

Rule Version

TMDS-00-000095

Severity Override Guidance

Review the Trend Deep Security server configuration to ensure audit information is protected from unauthorized modification.

Interview the ISSO in order to identify all users and their permissions to the audit records. The ISSO must identify each user along with their assigned role configured for the appropriate information systems allowed.

Verify the information gathered against the application's, "Computer and Group Rights" for each "Role" created along with the users assigned.

If the information gathered does not match the settings within the application this is a finding.

Check Content Reference

M

Target Key

2955

Comments