The WebSphere Application Server must be configured to protect log information from any type of unauthorized read access.
An XCCDF Rule
Description
<VulnDiscussion>WebSphere uses role-based access controls to restrict access to log data. To take advantage of this capability, WebSphere administrators must identify specific users and place them into their respective roles. The auditor role is used for controlling access to logs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-95967r1_rule
- Severity
- Low
- References
- Updated
Remediation - Manual Procedure
On the system hosting the WebSphere application server, log on to the operating system with admin rights.
Navigate to the WebSphere folder, change permissions on the folder. Do not propagate permissions to sub-folders.
For UNIX systems: set "WebSphere" folder permissions to "770".