SV-222490r508029_rule
V-222490
SRG-APP-000364
APSC-DV-001160
CAT II
10
Configure the application to log to a centralized auditing capability that provides on-demand reports based on the filtered audit event data or design or configure the application to meet the requirement.
Review the system documentation and interview the application administrator for details regarding application architecture and logging configuration.
Identify the application components and the logs associated with the components.
If the application utilizes a centralized logging system that provides the capability to generate reports based on filtered log events, this requirement is not applicable.
Using the relevant application features for generating reports and/or searching application data, (this is usually executed directly within a logging utility or within a reports feature or function) configure a filter based on any of the security criteria provided below.
Alternatively, you can use security-oriented criteria provided by the application administrator.
Once the data filter has been selected, filter the audit event data so only filtered data is displayed and generate the report.
The report can be any combination of screen-based, soft copy, or a printed report.
Criteria:
Users: e.g., specific users or groups
Event types:
Event dates and time:
System resources involved: e.g., application components or modules.
IP addresses:
Information objects accessed:
Event level categories: e.g., high, critical, warning, error
If the application does not provide an audit reduction capability that supports on-demand reports based on the filtered audit event data, this is a finding.
V-222490
False
APSC-DV-001160
Review the system documentation and interview the application administrator for details regarding application architecture and logging configuration.
Identify the application components and the logs associated with the components.
If the application utilizes a centralized logging system that provides the capability to generate reports based on filtered log events, this requirement is not applicable.
Using the relevant application features for generating reports and/or searching application data, (this is usually executed directly within a logging utility or within a reports feature or function) configure a filter based on any of the security criteria provided below.
Alternatively, you can use security-oriented criteria provided by the application administrator.
Once the data filter has been selected, filter the audit event data so only filtered data is displayed and generate the report.
The report can be any combination of screen-based, soft copy, or a printed report.
Criteria:
Users: e.g., specific users or groups
Event types:
Event dates and time:
System resources involved: e.g., application components or modules.
IP addresses:
Information objects accessed:
Event level categories: e.g., high, critical, warning, error
If the application does not provide an audit reduction capability that supports on-demand reports based on the filtered audit event data, this is a finding.
M
4093