Skip to content

Central Log Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000033

    Group
  • The Central Log Server must be configured to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...
    Rule High Severity
  • SRG-APP-000080

    Group
  • SRG-APP-000086

    Group
  • The Central Log Server must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.

    If the application is not configured to collate records based on the time when the events occurred, the ability to perform forensic analysis and investigations across multiple components is signifi...
    Rule Low Severity
  • SRG-APP-000086

    Group
  • SRG-APP-000086

    Group
  • Where multiple log servers are installed in the enclave, each log server must be configured to aggregate log records to a central aggregation server or other consolidated events repository.

    Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that network segment. However, this does not achieve compliance with the DoD requi...
    Rule Medium Severity
  • SRG-APP-000089

    Group
  • The Central Log Server must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.

    Log records can be generated from various components within the application (e.g., process, module). Certain specific application functionalities may be audited as well. The list of audited events ...
    Rule Medium Severity
  • SRG-APP-000090

    Group
  • SRG-APP-000111

    Group
  • SRG-APP-000115

    Group
  • The Central Log Server must be configured to perform on-demand filtering of the log records for events of interest based on organization-defined criteria.

    The ability to specify the event criteria that are of interest provides the persons reviewing the logs with the ability to quickly isolate and identify these events without having to review entries...
    Rule Low Severity
  • SRG-APP-000116

    Group
  • The Central Log Server must be configured to use internal system clocks to generate time stamps for log records.

    Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for the time, forensic analysis would be impeded. Determining the correct tim...
    Rule Low Severity
  • SRG-APP-000125

    Group
  • SRG-APP-000125

    Group
  • The Central Log Server system backups must be retained for a minimum of 5 years for SAMI (Sources and Methods Information) and a minimum of 7 days for non-SAMI on media capable of guaranteeing file integrity for the minimum applicable information retention period.

    If backups are not properly processed, protected, and stored on appropriate media, recovery from a system failure or implementation of a contingency plan would not include the data necessary to ful...
    Rule Low Severity
  • SRG-APP-000148

    Group
  • The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational use...
    Rule High Severity
  • SRG-APP-000149

    Group
  • The Central Log Server must use multifactor authentication for network access to privileged user accounts.

    Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authentica...
    Rule Medium Severity
  • SRG-APP-000150

    Group
  • The Central Log Server must use multifactor authentication for network access to non-privileged user accounts.

    To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor aut...
    Rule Medium Severity
  • SRG-APP-000151

    Group
  • SRG-APP-000154

    Group
  • The Central Log Server must be configured to use multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.

    Using an authentication device, such as a DOD common access card (CAC) or token separate from the information system, ensures that even if the information system is compromised, that compromise wil...
    Rule Medium Severity
  • SRG-APP-000156

    Group
  • The Central Log Server must use FIPS-validated SHA-1 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule Medium Severity
  • SRG-APP-000163

    Group
  • SRG-APP-000164

    Group
  • The Central Log Server must be configured to enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-APP-000166

    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Low Severity
  • SRG-APP-000167

    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Low Severity
  • SRG-APP-000168

    Group
  • The Central Log Server must be configured to enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Low Severity
  • SRG-APP-000169

    Group
  • SRG-APP-000170

    Group
  • The Central Log Server must be configured to require the change of at least eight of the total number of characters when passwords are changed.

    If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...
    Rule Low Severity
  • SRG-APP-000171

    Group
  • For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read and easily compromised. Use of ...
    Rule High Severity
  • SRG-APP-000172

    Group
  • SRG-APP-000173

    Group
  • The Central Log Server must be configured to enforce 24 hours/1 day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement. Restricting this setting limits the user's ability to...
    Rule Low Severity
  • SRG-APP-000174

    Group
  • SRG-APP-000175

    Group
  • The Central Log Server, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules