STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

DISA Rule

SV-96003r1_rule

Vulnerability Number

V-81289

Group Title

SRG-APP-000176-AU-002640

Rule Version

SRG-APP-000176-AU-002640

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

If using PKI-based authentication, configure the Central Log Server to enforce authorized access to the corresponding private key.

Check Contents

If not using PKI-based authentication this is NA.

Examine the configuration.

Verify the Central Log Server is configured to enforce authorized access to the corresponding private key when using PKI-based authentication.

If the Central Log Server is not configured to enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.

Vulnerability Number

V-81289

Documentable

False

Rule Version

SRG-APP-000176-AU-002640

Severity Override Guidance

If not using PKI-based authentication this is NA.

Examine the configuration.

Verify the Central Log Server is configured to enforce authorized access to the corresponding private key when using PKI-based authentication.

If the Central Log Server is not configured to enforce authorized access to the corresponding private key when using PKI-based authentication, this is a finding.

Check Content Reference

M

Target Key

3395

Comments