STIGQter STIGQter: STIG Summary: IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 05 Jun 2017:

The MQ Appliance network device must generate audit records when concurrent logons from different workstations occur.

DISA Rule

SV-89683r1_rule

Vulnerability Number

V-75009

Group Title

SRG-APP-000506-NDM-000323

Rule Version

MQMH-ND-001370

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Log on to the MQ Appliance CLI as a privileged user.

To enter global configuration mode, enter "config".

To create a syslog target, enter:
logging target <logging target name>
type syslog
admin-state enabled
local-address <MQ Appliance IP>
remote-address <syslog server IP>
remote-port <syslog server port>
event audit info
event auth notice
event mgmt notice
event cli notice
event user notice
event system error
exit
write mem
y

Check Contents

Log on to the MQ Appliance CLI as a privileged user.

Enter:
co
show logging target

All configured logging targets will be displayed. Verify:
- This list includes a remote syslog notification target; and
- It includes all desired log event source and log level parameters:
event audit info
event auth notice
event mgmt notice
event cli notice
event user notice
event system error

Log onto the MQ appliance from two different workstations simultaneously.

Request a copy of the audit logs and verify both events were recorded in the logs.

If log events were not created, this is a finding.

Vulnerability Number

V-75009

Documentable

False

Rule Version

MQMH-ND-001370

Severity Override Guidance

Log on to the MQ Appliance CLI as a privileged user.

Enter:
co
show logging target

All configured logging targets will be displayed. Verify:
- This list includes a remote syslog notification target; and
- It includes all desired log event source and log level parameters:
event audit info
event auth notice
event mgmt notice
event cli notice
event user notice
event system error

Log onto the MQ appliance from two different workstations simultaneously.

Request a copy of the audit logs and verify both events were recorded in the logs.

If log events were not created, this is a finding.

Check Content Reference

M

Target Key

3243

Comments