Skip to content

The application server must use cryptographic mechanisms to protect the integrity of log information.

An XCCDF Rule

Description

<VulnDiscussion>Protecting the integrity of log records helps to ensure log files are not tampered with. Cryptographic mechanisms are the industry-established standard used to protect the integrity of log data. An example of cryptographic mechanisms is the computation and application of a cryptographic hash and using asymmetric cryptography with digital signatures. Application Servers often write log data to files on the file system. These files typically roll over on a periodic basis. Once the logs are rolled over, hashing and signing the logs assures the logs are not tampered with and helps to assure log integrity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-204739r960951_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Configure the application server to hash and sign logs using cryptographic means. 

Alternatively, configure the application server or OS to send logs to a centralized log server that meets the hashing and signing requirement.