SV-222474r508029_rule
V-222474
SRG-APP-000097
APSC-DV-000990
CAT II
10
Configure the application to log which component, feature or functionality of the application triggered the event.
Review application administration and/or design documents.
Identify key aspects of application architecture objects and components, e.g., Web Server, Application server, Database server.
Interview the application administrator and identify the log locations.
Access the application logs and review the log entries for events that indicate the application is auditing the internal components, objects, or functions of the application.
Confirm the event logs provide information as to which component, feature, or functionality of the application triggered the event.
Examples of the types of events to look for are as follows:
- Application and Protocol events. e.g., Application loads or unloads and Protocol use.
- Data Access events. e.g., Database connections.
Events could include reference to database library or executable initiating connectivity:
- Middleware events. e.g., Source code initiating calls or being invoked.
- Name of application modules being loaded or unloaded.
- Library loads and unloads.
- Application deployment activity.
Events written into the log must be able to be traced back to the originating component, feature or function name, service name, application name, library name etcetera in order to establish which aspect of the application triggered the event.
If the audit logs do not contain enough data in the logs to establish which component, feature or functionality of the application triggered the event, this is a finding.
V-222474
False
APSC-DV-000990
Review application administration and/or design documents.
Identify key aspects of application architecture objects and components, e.g., Web Server, Application server, Database server.
Interview the application administrator and identify the log locations.
Access the application logs and review the log entries for events that indicate the application is auditing the internal components, objects, or functions of the application.
Confirm the event logs provide information as to which component, feature, or functionality of the application triggered the event.
Examples of the types of events to look for are as follows:
- Application and Protocol events. e.g., Application loads or unloads and Protocol use.
- Data Access events. e.g., Database connections.
Events could include reference to database library or executable initiating connectivity:
- Middleware events. e.g., Source code initiating calls or being invoked.
- Name of application modules being loaded or unloaded.
- Library loads and unloads.
- Application deployment activity.
Events written into the log must be able to be traced back to the originating component, feature or function name, service name, application name, library name etcetera in order to establish which aspect of the application triggered the event.
If the audit logs do not contain enough data in the logs to establish which component, feature or functionality of the application triggered the event, this is a finding.
M
4093