STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

Analysis, viewing, and indexing functions, services, and applications used as part of the Central Log Server must be configured to comply with DoD-trusted path and access requirements.

DISA Rule

SV-95905r1_rule

Vulnerability Number

V-81191

Group Title

SRG-APP-000516-AU-000410

Rule Version

SRG-APP-000516-AU-000410

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure all analysis, viewing, and indexing functions, services, and applications used with the Central Log Server to comply with DoD-trusted path and access requirements.

Check Contents

Examine the configuration.

Verify analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are configured to comply with DoD-trusted path and access requirements.

If analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are not configured to comply with DoD-trusted path and access requirements, this is a finding.

Vulnerability Number

V-81191

Documentable

False

Rule Version

SRG-APP-000516-AU-000410

Severity Override Guidance

Examine the configuration.

Verify analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are configured to comply with DoD-trusted path and access requirements.

If analysis, viewing, and indexing functions, services, and applications used with the Central Log Server are not configured to comply with DoD-trusted path and access requirements, this is a finding.

Check Content Reference

M

Target Key

3395

Comments