Skip to content

Central Log Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Central Log Server must protect audit tools from unauthorized deletion.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether or no...
    Rule Low Severity
  • The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the f...
    Rule Low Severity
  • The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect the integrity of the authenticator and authentication mechanism used for...
    Rule High Severity
  • The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.

    If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to respond effectively and important f...
    Rule Low Severity
  • The Central Log Server must implement an audit reduction capability that supports on-demand reporting requirements.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that supports on-demand audit review and analysis.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that supports on-demand reporting requirements.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement an audit reduction capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules