Central Log Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000389
Group -
SRG-APP-000427
Group -
The Central Log Server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...Rule Medium Severity -
SRG-APP-000503
Group -
The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-APP-000610
Group -
SRG-APP-000095
Group -
SRG-APP-000516
Group -
The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.
If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to respond effectively and important f...Rule Low Severity -
SRG-APP-000705
Group -
The Central Log Server must disable accounts when the accounts are no longer associated to a user.
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality which reduce the attack surface of the system.Rule Medium Severity -
SRG-APP-000745
Group -
The Central Log Server must implement the capability to centrally review and analyze audit records from multiple components within the system.
Automated mechanisms for centralized reviews and analyses include security information and event management products.Rule Medium Severity -
SRG-APP-000750
Group -
The Central Log Server must implement an audit reduction capability that supports on-demand audit review and analysis.
Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...Rule Medium Severity -
SRG-APP-000755
Group -
SRG-APP-000760
Group -
The Central Log Server must implement an audit reduction capability that supports after-the-fact investigations of incidents.
Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...Rule Medium Severity -
SRG-APP-000765
Group -
SRG-APP-000770
Group -
SRG-APP-000775
Group -
The Central Log Server must implement a report generation capability that supports after-the-fact investigations of incidents.
Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report ge...Rule Medium Severity -
SRG-APP-000780
Group -
SRG-APP-000785
Group -
SRG-APP-000790
Group -
The Central Log Server must implement the capability to process, sort, and search audit records for events of interest based on organization-defined audit fields within audit records.
Events of interest can be identified by the content of audit records, including system resources involved, information objects accessed, identities of individuals, event types, event locations, eve...Rule Medium Severity -
SRG-APP-000795
Group -
The Central Log Server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit log...Rule Medium Severity -
SRG-APP-000800
Group -
The Central Log Server must implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds.
Permitting authorized individuals to make changes to system logging enables organizations to extend or limit logging as necessary to meet organizational requirements. Logging that is limited to con...Rule Medium Severity -
SRG-APP-000805
Group -
The Central Log Server must automatically generate audit records of the enforcement actions.
Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organization...Rule Medium Severity -
SRG-APP-000810
Group -
SRG-APP-000815
Group -
The Central Log Server must require users to be individually authenticated before granting access to the shared accounts or resources.
Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.Rule Medium Severity -
SRG-APP-000825
Group -
SRG-APP-000830
Group -
The Central Log Server must for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...Rule Medium Severity -
SRG-APP-000835
Group -
SRG-APP-000840
Group -
The Central Log Server must for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords or passphrases are preferable over shorter pass...Rule Medium Severity -
SRG-APP-000845
Group -
SRG-APP-000855
Group -
SRG-APP-000860
Group -
SRG-APP-000865
Group -
SRG-APP-000875
Group -
SRG-APP-000910
Group -
SRG-APP-000915
Group -
The Central Log Server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys.Rule Medium Severity -
SRG-APP-000920
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.