UCF STIG Viewer Logo

Trend Deep Security must generate audit records when successful/unsuccessful attempts to delete privileges occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66019 TMDS-00-000365 SV-80509r1_rule Medium
Description
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).
STIG Date
Trend Micro Deep Security 9.x Security Technical Implementation Guide 2016-02-26

Details

Check Text ( C-66667r1_chk )
Review the Trend Deep Security server configuration to ensure audit records are generated when successful/unsuccessful attempts to delete privileges occur.

Review the system using the Administration >> System Settings >> System Events tab for successful/unsuccessful attempts to delete privileges.

If the “Record” and “Forward” options for successful/unsuccessful attempts to delete privileges are not enabled, this is a finding.
Fix Text (F-72095r1_fix)
Configure the Trend Deep Security server to generate audit records when successful/unsuccessful attempts to delete privileges occur.

Configure the alert using the Administration >> System Settings >> System Events tab for successful/unsuccessful attempts to delete privileges. Select the “Record” and “Forward” options for the following:

- Event ID: 124 Rule Update Deleted
- Event ID: 661 Role Deleted
- Event ID: 671 Contact Deleted
- Event ID: 291 Group Removed
- Event ID: 1901 Cloud Account Removed