Skip to content

Central Log Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000925

    Group
  • The Central Log Server must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.

    Synchronization of internal system clocks with an authoritative source provides uniformity of time stamps for systems with multiple system clocks and systems connected over a network.
    Rule Medium Severity
  • The Central Log Server must be configured to protect the data sent from hosts and devices from being altered in a way that may prevent the attribution of an action to an individual (or process acting on behalf of an individual).

    Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of an individual). The records stored by the Central Log Server must be pr...
    Rule Medium Severity
  • Time stamps recorded on the log records in the Central Log Server must be configured to synchronize to within one second of the host server or, if NTP is configured directly in the log server, the NTP time source must be the same as the host and devices within its scope of coverage.

    If the application is not configured to collate records based on the time when the events occurred, the ability to perform forensic analysis and investigations across multiple components is signifi...
    Rule Low Severity
  • The Central Log Server must be configured to allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.

    Without restricting which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audits may degrade ...
    Rule Low Severity
  • The Central Log Server must be configured to perform analysis of log records across multiple devices and hosts in the enclave that can be reviewed by authorized individuals.

    Successful incident response and auditing relies on timely, accurate system information and analysis to allow the organization to identify and respond to potential incidents in a proficient manner....
    Rule Low Severity
  • The Central Log Server must be configured to back up the log records repository at least every seven days onto a different system or system component other than the system or component being audited.

    Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up log records to a different system or onto separate media than the system being audited on an organi...
    Rule Low Severity
  • The Central Log Server must use multifactor authentication for local access using privileged user accounts.

    To ensure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authent...
    Rule Medium Severity
  • The Central Log Server must disable accounts (individuals, groups, roles, and devices) after 35 days of inactivity.

    Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can potentially obtain and maintain undetected access to the application. Own...
    Rule Medium Severity
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Low Severity
  • For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • The Central Log Server must be configured to enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and p...
    Rule Low Severity
  • The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.

    To prevent the compromise of authentication information such as passwords during the authentication process, the feedback from the information system must not provide any information that would all...
    Rule High Severity
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect the integrity of the authenticator and authentication mechanism used for...
    Rule High Severity
  • For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.

    When application accounts are removed, user accessibility is affected. Accounts are used for identifying users or for identifying the application processes themselves. Sending notification of accou...
    Rule Low Severity
  • The Central Log Server must be configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.

    The ability to search the log records to better view events of interest provides the persons reviewing the logs with the ability to quickly isolate and identify these events without having to revie...
    Rule Low Severity
  • The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.

    If the report generation capability does not support after-the-fact investigations, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack or identify...
    Rule Low Severity
  • The Central Log Server must be configured to accept the DoD CAC credential to support identity management and personal authentication.

    The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support identity management and personal authentication f...
    Rule Medium Severity
  • The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requiremen...
    Rule High Severity
  • The Central Log Server must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    In this case the information producer is the device based on IP address or some other identifier of the device producing the information. The source of the record must be bound to the record using ...
    Rule Medium Severity
  • The Central Log Server must be configured to automatically create trouble tickets for organization-defined threats and events of interest as they are detected in real time (within seconds).

    In most Central Log Server products today, log review (threat detection), can be automated by creating correlation content matching the organizational-defined Events of Interest (e.g., account chan...
    Rule Medium Severity
  • The Central Log Server must be configured with the organization-defined severity or criticality levels of each event that is being sent from individual devices or hosts.

    This supports prioritization functions, which is a major reason why centralized management is a requirement in DoD. This includes different features that help highlight the important events over le...
    Rule Medium Severity
  • The Central Log Server must automatically audit account creation.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply create...
    Rule Medium Severity
  • The Central Log Server must automatically audit account disabling actions.

    When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application, the attacker often attempts to disable authorized accounts to disrupt ...
    Rule Medium Severity
  • The Central Log Server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the Central Log Server.

    Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive ...
    Rule Low Severity
  • The Central Log Server must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.

    The banner must be acknowledged by the user prior to allowing the user access to the application. This provides assurance that the user has seen the message and accepted the conditions for access. ...
    Rule Low Severity
  • The Central Log Server must produce audit records containing information to establish what type of events occurred.

    Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit r...
    Rule Low Severity
  • The Central Log Server must produce audit records containing information to establish where the events occurred.

    Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment, and provi...
    Rule Low Severity
  • The Central Log Server must protect audit information from any type of unauthorized read access.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult if not impossible to achieve. In ad...
    Rule Medium Severity
  • The Central Log Server must protect audit tools from unauthorized modification.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • The Central Log Server must protect audit tools from unauthorized deletion.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • The Central Log Server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether or no...
    Rule Low Severity
  • The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applications provide the capability to change security roles or escalate the f...
    Rule Low Severity
  • The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect the integrity of the authenticator and authentication mechanism used for...
    Rule High Severity
  • The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.

    If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to respond effectively and important f...
    Rule Low Severity
  • The Central Log Server must implement an audit reduction capability that supports on-demand reporting requirements.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that supports on-demand audit review and analysis.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that supports on-demand reporting requirements.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement an audit reduction capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must implement a report generation capability that does not alter original content or time ordering of audit records.

    Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...
    Rule Medium Severity
  • The Central Log Server must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.

    Software and firmware components prevented from installation unless signed with recognized and approved certificates include software and firmware version updates, patches, service packs, device dr...
    Rule Medium Severity
  • The Central Log Server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.

    The purpose of requiring a device that is separate from the system to which the user is attempting to gain access for one of the factors during multifactor authentication is to reduce the likelihoo...
    Rule Medium Severity
  • The Central Log Server must for password-based authentication, update the list of passwords on an organization-defined frequency.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • The Central Log Server must for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • The Central Log Server must for password-based authentication, require immediate selection of a new password upon account recovery.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • The Central Log Server must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • The Central Log Server must for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.

    Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...
    Rule Medium Severity
  • The Central Log Server must for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.

    Public key cryptography is a valid authentication mechanism for individuals, machines, and devices. For PKI solutions, status information for certification paths includes certificate revocation lis...
    Rule Medium Severity
  • The Central Log Server must include only approved trust anchors in trust stores or certificate stores managed by the organization.

    Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-...
    Rule Medium Severity
  • The Central Log Server must synchronize system clocks within and between systems or system components.

    Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication processes that involve certificates and time-of-day...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules