Skip to content

The WebSphere Application Server must protect log information from unauthorized modification.

An XCCDF Rule

Description

<VulnDiscussion>WebSphere uses role-based access controls to restrict access to log data. To take advantage of this capability, WebSphere administrators must identify specific users and place them into their respective roles. The auditor role is used for controlling access to logs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-95969r1_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

On the system hosting the WebSphere application server, log on to the operating system with admin rights.

Navigate to the "WebSphere" folder, change permissions on the folder. Do not propagate permissions to sub-folders.

For UNIX systems: set "WebSphere folder" permissions to "770".