STIGQter STIGQter: STIG Summary: ArcGIS for Server 10.3 Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 26 Jan 2018:

The ArcGIS Server must protect audit information from any type of unauthorized read access, modification or deletion.

DISA Rule

SV-79897r1_rule

Vulnerability Number

V-65407

Group Title

SRG-APP-000118

Rule Version

AGIS-00-000044

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the ArcGIS Server to ensure mechanisms are provided that protect audit information from any type of unauthorized read access, modification or deletion. Substitute the target environment’s values for [bracketed] variables.

Within Windows Explorer, access the "Security" (tab) property of the "[C:\arcgisserver]\logs" folder. Grant the "ArcGIS Server Account" full control of this folder.

Remove any unauthorized accounts or groups from this folder.

Check Contents

Review the ArcGIS Server configuration to ensure mechanisms are provided that protect audit information from any type of unauthorized read access, modification or deletion. Substitute the target environment’s values for [bracketed] variables.

Within Windows Explorer, access the "Security" (tab) property of the "[C:\arcgisserver]\logs" folder.

Verify only the "ArcGIS Server Account" has full control of this folder. Verify any other accounts that have read or other rights to this folder are authorized and documented.

If unauthorized accounts have read or other rights to this folder, this is a finding.

Vulnerability Number

V-65407

Documentable

False

Rule Version

AGIS-00-000044

Severity Override Guidance

Review the ArcGIS Server configuration to ensure mechanisms are provided that protect audit information from any type of unauthorized read access, modification or deletion. Substitute the target environment’s values for [bracketed] variables.

Within Windows Explorer, access the "Security" (tab) property of the "[C:\arcgisserver]\logs" folder.

Verify only the "ArcGIS Server Account" has full control of this folder. Verify any other accounts that have read or other rights to this folder are authorized and documented.

If unauthorized accounts have read or other rights to this folder, this is a finding.

Check Content Reference

M

Target Key

2961

Comments