SV-222489r508029_rule
V-222489
SRG-APP-000181
APSC-DV-001150
CAT II
10
Configure the application to generate soft copy, hard copy and/or screen-based reports based on the selected filtered event data.
Review the system documentation and interview the application administrator for details regarding application architecture and logging configuration.
Identify the application components and the logs associated with the components.
If the application utilizes a centralized logging system that provides the capability to generate reports based on filtered log events, this requirement is not applicable.
Using the relevant application features for generating reports and/or searching application data, (this is usually executed directly within a logging utility or within a reports feature or function) configure a filter based on any of the security criteria provided below.
Alternatively, you can use security-oriented criteria provided by the application administrator.
Once the data filter has been selected, filter the audit event data so only filtered data is displayed and generate the report.
The report can be any combination of screen-based, soft copy, or a printed report.
Criteria:
Users: e.g., specific users or groups
Event types:
Event dates and time:
System resources involved: e.g., application components or modules.
IP addresses:
Information objects accessed:
Event level categories: e.g., high, critical, warning, error
If the application does not provide on demand reports based on the filtered audit event data, this is a finding.
V-222489
False
APSC-DV-001150
Review the system documentation and interview the application administrator for details regarding application architecture and logging configuration.
Identify the application components and the logs associated with the components.
If the application utilizes a centralized logging system that provides the capability to generate reports based on filtered log events, this requirement is not applicable.
Using the relevant application features for generating reports and/or searching application data, (this is usually executed directly within a logging utility or within a reports feature or function) configure a filter based on any of the security criteria provided below.
Alternatively, you can use security-oriented criteria provided by the application administrator.
Once the data filter has been selected, filter the audit event data so only filtered data is displayed and generate the report.
The report can be any combination of screen-based, soft copy, or a printed report.
Criteria:
Users: e.g., specific users or groups
Event types:
Event dates and time:
System resources involved: e.g., application components or modules.
IP addresses:
Information objects accessed:
Event level categories: e.g., high, critical, warning, error
If the application does not provide on demand reports based on the filtered audit event data, this is a finding.
M
4093