STIGQter STIGQter: STIG Summary: vRealize - Cassandra Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 05 Jun 2017:

The Cassandra database must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

DISA Rule

SV-87257r1_rule

Vulnerability Number

V-72625

Group Title

SRG-APP-000090-DB-000065

Rule Version

VROM-CS-000015

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Cassandra Server settings to allow designated personnel to select which auditable events are audited.

At the command line execute the following command:

# chmod 0640 /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

Check Contents

Check the Cassandra Server settings and documentation to determine whether designated personnel are able to select which auditable events are being audited.

At the command prompt, execute the following command:

# ls -al /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

If the permissions are not "0640", this is a finding.

Vulnerability Number

V-72625

Documentable

False

Rule Version

VROM-CS-000015

Severity Override Guidance

Check the Cassandra Server settings and documentation to determine whether designated personnel are able to select which auditable events are being audited.

At the command prompt, execute the following command:

# ls -al /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

If the permissions are not "0640", this is a finding.

Check Content Reference

M

Target Key

3179

Comments