STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.

DISA Rule

SV-96023r1_rule

Vulnerability Number

V-81309

Group Title

SRG-APP-000150-AU-002320

Rule Version

SRG-APP-000150-AU-002320

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This requirement applies to all non-privileged accounts used for access to the system via network access.

For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for network access to logon to the Central Log Server.

Check Contents

Examine the configuration.

Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts.

If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.

Vulnerability Number

V-81309

Documentable

False

Rule Version

SRG-APP-000150-AU-002320

Severity Override Guidance

Examine the configuration.

Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for logon via the network for all non-privileged accounts.

If the Central Log Server is not configured to use multifactor authentication for network access to non-privileged user accounts, this is a finding.

Check Content Reference

M

Target Key

3395

Comments