SV-222444r508029_rule
V-222444
SRG-APP-000089
APSC-DV-000650
CAT II
10
Design or reconfigure the application to not write sensitive data to the logs.
Review the application logs and identify application logging format. Using the format of the log and the requisite search data as a guide to create your search, create search strings that could successfully identify the existence of passwords, session IDs, or other sensitive information such as SSN.
Utilizing the UNIX grep-based search utility include the following examples which are meant to illustrate the purpose of the requirement.
Password values are usually associated with usernames so searching for "username" in the provided log file will often assist in determining if password values are included.
grep -i "username" < logfile.txt
Search for social security numbers in the provided log file.
grep -i "[0-9]{3}[-]?[0-9]{2}[-]?[0-9]{4}" < logfile.txt
Use regular expressions to aid in searching log files. All search syntax cannot be provided within the STIG, the reviewer must utilize their knowledge to create new search criteria based upon the log format used and the potentially sensitive data processed by the application.
If the application logs sensitive data such as session IDs, application source code, encryption keys, or passwords, this is a finding.
V-222444
False
APSC-DV-000650
Review the application logs and identify application logging format. Using the format of the log and the requisite search data as a guide to create your search, create search strings that could successfully identify the existence of passwords, session IDs, or other sensitive information such as SSN.
Utilizing the UNIX grep-based search utility include the following examples which are meant to illustrate the purpose of the requirement.
Password values are usually associated with usernames so searching for "username" in the provided log file will often assist in determining if password values are included.
grep -i "username" < logfile.txt
Search for social security numbers in the provided log file.
grep -i "[0-9]{3}[-]?[0-9]{2}[-]?[0-9]{4}" < logfile.txt
Use regular expressions to aid in searching log files. All search syntax cannot be provided within the STIG, the reviewer must utilize their knowledge to create new search criteria based upon the log format used and the potentially sensitive data processed by the application.
If the application logs sensitive data such as session IDs, application source code, encryption keys, or passwords, this is a finding.
M
4093