SV-222507r508029_rule
V-222507
SRG-APP-000126
APSC-DV-001350
CAT II
10
Configure the application to create an integrity check consisting of a cryptographic hash or one-way digest that can be used to establish the integrity when storing log files.
Review the system documentation and interview the application administrator for details regarding application architecture, audit methods, and provided audit tools.
Identify the location of the application audit information.
If the application is configured to utilize a centralized audit log solution that uses cryptographic methods that meet this requirement such as creating cryptographic hash values or message digests that can be used to validate integrity of audit files, the requirement is not applicable.
Ask application administrator to demonstrate the cryptographic mechanisms used to protect the integrity of audit data.
Verify when application logs are stored on the file system, a process that includes the creation of an integrity check of the audit file being stored is utilized. This integrity check can be the creation of a checksum, message digest or other one-way cryptographic hash of the audit file that is created.
If an integrity check is not created to protect the integrity of the audit information, this is a finding.
V-222507
False
APSC-DV-001350
Review the system documentation and interview the application administrator for details regarding application architecture, audit methods, and provided audit tools.
Identify the location of the application audit information.
If the application is configured to utilize a centralized audit log solution that uses cryptographic methods that meet this requirement such as creating cryptographic hash values or message digests that can be used to validate integrity of audit files, the requirement is not applicable.
Ask application administrator to demonstrate the cryptographic mechanisms used to protect the integrity of audit data.
Verify when application logs are stored on the file system, a process that includes the creation of an integrity check of the audit file being stored is utilized. This integrity check can be the creation of a checksum, message digest or other one-way cryptographic hash of the audit file that is created.
If an integrity check is not created to protect the integrity of the audit information, this is a finding.
M
4093