UCF STIG Viewer Logo

The vAMI must enable logging.


Overview

Finding ID Version Rule ID IA Controls Severity
V-240960 VRAU-VA-000615 SV-240960r879875_rule Medium
Description
Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Privileged activities would occur through the management interface. This interface can be web-based or can be command line utilities. Whichever method is used by the application server, these activities must be logged.
STIG Date
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide 2023-09-12

Details

Check Text ( C-44193r676045_chk )
At the command prompt, execute the following command:

grep traceLevel /opt/vmware/etc/sfcb/sfcb.cfg

If the value of "traceLevel" is not "1", this is a finding.
Fix Text (F-44152r676046_fix)
Navigate to and open /opt/vmware/etc/sfcb/sfcb.cfg.

Configure the sfcb.cfg file with the following value: 'traceLevel: 1'