UCF STIG Viewer Logo

Trend Deep Security must automatically audit account disabling actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-65865 TMDS-00-000030 SV-80355r1_rule Medium
Description
When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual application users or for identifying the application processes themselves. In order to detect and respond to events affecting user accessibility and application processing, applications must audit account disabling actions and, as required, notify the appropriate individuals, so they can investigate the event. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. To address access requirements, many application developers choose to integrate their applications with enterprise-level authentication/access/audit mechanisms meeting or exceeding access control policy requirements. Such integration allows the application developer to off-load those access control functions and focus on core application features and functionality.
STIG Date
Trend Micro Deep Security 9.x Security Technical Implementation Guide 2016-02-26

Details

Check Text ( C-66513r1_chk )
Review the Trend Deep Security server configuration to ensure account disabling actions are automatically audited.

Verify "User Locked Out" events are enabled by reviewing the following:

Administration >> System Settings >> System Events >> Enable Event ID 603 User Locked Out.

Select: Record
Select: Forward

If "User Locked Out" is not enabled this is a finding.
Fix Text (F-71941r1_fix)
Configure the Trend Deep Security server to automatically audit account disabling actions.

Enable "User Locked Out" events by selecting the following:

Administration >> System Settings >> System Events >> Enable Event ID 603 User Locked Out.

Select: Record
Select: Forward