STIGQter STIGQter: STIG Summary: Application Server Security Requirements Guide Version: 3 Release: 1 Benchmark Date: 23 Oct 2020:

The application server must protect log tools from unauthorized modification.

DISA Rule

SV-204736r508029_rule

Vulnerability Number

V-204736

Group Title

SRG-APP-000122

Rule Version

SRG-APP-000122-AS-000082

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application server or the OS to protect log tools from unauthorized modification.

Check Contents

Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized modification. Request a system administrator attempt to modify log tools while logged into the server in a role that does not have the requisite privileges.

Locate binary copies of log tool executables that are located on the file system and attempt to modify using unprivileged credentials.

If the application server does not protect log tools from unauthorized modification, this is a finding.

Vulnerability Number

V-204736

Documentable

False

Rule Version

SRG-APP-000122-AS-000082

Severity Override Guidance

Review the application server documentation and server configuration to determine if the application server protects log tools from unauthorized modification. Request a system administrator attempt to modify log tools while logged into the server in a role that does not have the requisite privileges.

Locate binary copies of log tool executables that are located on the file system and attempt to modify using unprivileged credentials.

If the application server does not protect log tools from unauthorized modification, this is a finding.

Check Content Reference

M

Target Key

2900

Comments