Central Log Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Central Log Server must be configured to enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-APP-000170
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to require the change of at least 8 of the total number of characters when passwords are changed.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Low Severity -
SRG-APP-000171
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the Central Log Server must be configured to store only cryptographic representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000173
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce 24 hours/1 day as the minimum password lifetime.
<VulnDiscussion>Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...Rule Low Severity -
SRG-APP-000174
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...Rule Low Severity -
The Central Log Server, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule High Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The Central Log Server, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule High Severity -
SRG-APP-000177
<GroupDescription></GroupDescription>Group -
The Central Log Server must map the authenticated identity to the individual user or group account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule Low Severity -
SRG-APP-000178
<GroupDescription></GroupDescription>Group -
The Central Log Server must obfuscate authentication information during the authentication process so that the authentication is not visible.
<VulnDiscussion>To prevent the compromise of authentication information such as passwords during the authentication process, the feedback fro...Rule High Severity -
SRG-APP-000179
<GroupDescription></GroupDescription>Group -
The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect ...Rule High Severity -
SRG-APP-000181
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to perform audit reduction that supports on-demand reporting requirements.
<VulnDiscussion>The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...Rule Medium Severity -
SRG-APP-000292
<GroupDescription></GroupDescription>Group -
For devices and hosts within its scope of coverage, the Central Log Server must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO) when account modification events are received.
<VulnDiscussion>When application accounts are modified, user accessibility is affected. Accounts are used for identifying individual users or...Rule Low Severity -
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account disabling actions are received.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are used for identifying individual users or...Rule Low Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
For devices and hosts within its scope of coverage, the Central Log Server must notify the System Administrator (SA) and Information System Security Officer (ISSO) when events indicating account removal actions are received.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are used for identifying users or for identif...Rule Low Severity -
SRG-APP-000356
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to generate reports that do not alter original content or time ordering of log records.
<VulnDiscussion>If the audit report generation capability alters the original content or time ordering of log records, the integrity of the l...Rule Low Severity -
The Central Log Server must be configured for centralized management of the events repository for the purposes of configuration, analysis, and reporting.
<VulnDiscussion>If the application is not configured to centrally manage the content captured in the log records, identification, troubleshoo...Rule Low Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to off-load log records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to pl...Rule Low Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
For the host and devices within its scope of coverage, the Central Log Server must be configured to send a real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) of all audit failure events, such as loss of communications with hosts and devices, or if log records are no longer being received.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Low Severity -
SRG-APP-000361
<GroupDescription></GroupDescription>Group -
SRG-APP-000374
<GroupDescription></GroupDescription>Group -
Upon receipt of the log record from hosts and devices, the Central Log Server must be configured to record time stamps of the time of receipt that can be mapped to Coordinated Universal Time (UTC).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Low Severity -
The Central Log Server must be configured to send an immediate alert to the System Administrator (SA) or Information System Security Officer (ISSO) if communication with the host and devices within its scope of coverage is lost.
<VulnDiscussion>If the system were to continue processing after audit failure, actions could be taken on the system that could not be tracked...Rule Low Severity -
SRG-APP-000362
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to perform on-demand sorting of log records for events of interest based on the content of organization-defined audit fields within log records.
<VulnDiscussion>The ability to sort the log records to better view events of interest provides the persons reviewing the logs with the abilit...Rule Low Severity -
SRG-APP-000363
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to perform on-demand searches of log records for events of interest based on the content of organization-defined audit fields within log records.
<VulnDiscussion>The ability to search the log records to better view events of interest provides the persons reviewing the logs with the abil...Rule Low Severity -
SRG-APP-000364
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to perform audit reduction that supports on-demand audit review and analysis.
<VulnDiscussion>The ability to perform on-demand audit review and analysis, including after the audit data has been subjected to audit reduct...Rule Medium Severity -
SRG-APP-000365
<GroupDescription></GroupDescription>Group -
The Central Log Server must be configured to perform audit reduction that supports after-the-fact investigations of security incidents.
<VulnDiscussion>If the audit reduction capability does not support after-the-fact investigations, it is difficult to establish, correlate, an...Rule Low Severity -
SRG-APP-000366
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.