STIGQter STIGQter: STIG Summary: vRealize - Cassandra Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 05 Jun 2017:

The Cassandra database must initiate session auditing upon startup.

DISA Rule

SV-87263r1_rule

Vulnerability Number

V-72631

Group Title

SRG-APP-000092-DB-000208

Rule Version

VROM-CS-000030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Cassandra Server to initiate session auditing upon startup.

At the command line execute the following command:

# sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

Check Contents

Review the Cassandra Server configuration to ensure session auditing is initiated upon startup.

At the command prompt, execute the following command:

# grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

If level is not set to "ALL", this is a finding.

Vulnerability Number

V-72631

Documentable

False

Rule Version

VROM-CS-000030

Severity Override Guidance

Review the Cassandra Server configuration to ensure session auditing is initiated upon startup.

At the command prompt, execute the following command:

# grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml

If level is not set to "ALL", this is a finding.

Check Content Reference

M

Target Key

3179

Comments