STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.

DISA Rule

SV-96015r1_rule

Vulnerability Number

V-81301

Group Title

SRG-APP-000439-AU-004310

Rule Version

SRG-APP-000439-AU-004310

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the Central Log Server to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.

Check Contents

Examine the configuration.

Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.

If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.

Vulnerability Number

V-81301

Documentable

False

Rule Version

SRG-APP-000439-AU-004310

Severity Override Guidance

Examine the configuration.

Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.

If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.

Check Content Reference

M

Target Key

3395

Comments