UCF STIG Viewer Logo

The application must invoke a system shutdown in the event of an audit failure, unless an alternative audit capability exists.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35298 SRG-APP-000107-MAPP-NA SV-46585r1_rule Medium
Description
It is critical when a system is at risk of failing to process audit logs as required; it takes action to mitigate the failure. If the system were to continue processing without auditing enabled, actions can be taken on the system that cannot be tracked and recorded for later forensic analysis. Audit processing failures include; software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. In many system configurations, the disk space allocated to the auditing system is separate from the disks allocated for the operating system; therefore, this may not result in a system outage. This forces the application to detect and take actions. Rationale for non-applicability: The mobile operating system is best positioned to provide support for central management of audit records. Permitting an application to shutdown the system in the event of an audit failure is a DoS vulnerability.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-43667r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-39844r1_fix)
The requirement is NA. No fix is required.