The WebSphere Application Server must be configured to sign log information.
An XCCDF Rule
Description
<VulnDiscussion>Protection of log records is of critical importance. Encrypting log records provides a level of protection that does not rely on host-based protections that can be accidentally misconfigured, such as file system permissions. Cryptographic mechanisms are the industry-established standard used to protect the integrity of log data. An example of a cryptographic mechanism is the computation and application of a cryptographic-signed hash using asymmetric cryptography.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-95981r1_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
From the administrative console, click Security >> Security Auditing >> Audit record signing configuration.
Select the "Enable signing" checkbox.
Select the keystore that contains the encrypting certificate from the drop-down menu.