SV-222494r508029_rule
V-222494
SRG-APP-000368
APSC-DV-001200
CAT II
10
Design or configure the application to provide after-the-fact report generation capability or utilize a centralized utility designed for the purpose of log management and reporting.
Review the application documentation and interview the application administrator for details regarding audit reduction (log record event filtering).
Access the application with user rights sufficient to read and filter audit records.
Navigate the application user interface and select the application functionality that provides access and interface to audit records and audit reduction (event filtering).
If the application uses a centralized logging solution that performs the report generation functions, the requirement is not applicable.
Create an event report. Report data can be based on date ranges, times or events, or other criteria that could be used in an investigation. Use of data from previous checks for audit reduction is encouraged.
Review the report and ensure the data in the report coincides with event filters used to create the report.
If the application does not have a report generation capability that supports after the fact security investigations, this is a finding.
V-222494
False
APSC-DV-001200
Review the application documentation and interview the application administrator for details regarding audit reduction (log record event filtering).
Access the application with user rights sufficient to read and filter audit records.
Navigate the application user interface and select the application functionality that provides access and interface to audit records and audit reduction (event filtering).
If the application uses a centralized logging solution that performs the report generation functions, the requirement is not applicable.
Create an event report. Report data can be based on date ranges, times or events, or other criteria that could be used in an investigation. Use of data from previous checks for audit reduction is encouraged.
Review the report and ensure the data in the report coincides with event filters used to create the report.
If the application does not have a report generation capability that supports after the fact security investigations, this is a finding.
M
4093