STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must use multifactor authentication for local access using privileged user accounts.

DISA Rule

SV-96027r1_rule

Vulnerability Number

V-81313

Group Title

SRG-APP-000151-AU-002330

Rule Version

SRG-APP-000151-AU-002330

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This requirement applies to all privileged user accounts used for local logon to the application.

For systems where individual users access, configure and/or manage the system, configure the Central Log Server to use DoD PKI (preferred) or another multifactor authentication solution for local logon to the Central Log Server.

Check Contents

Examine the configuration.

Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for local logon.

If the Central Log Server is not configured to use multifactor authentication for local access using privileged accounts, this is a finding.

Vulnerability Number

V-81313

Documentable

False

Rule Version

SRG-APP-000151-AU-002330

Severity Override Guidance

Examine the configuration.

Verify the Central Log Server is configured to require DoD PKI or another multifactor authentication method for local logon.

If the Central Log Server is not configured to use multifactor authentication for local access using privileged accounts, this is a finding.

Check Content Reference

M

Target Key

3395

Comments