The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-204719 | SRG-APP-000091-AS-000052 | SV-204719r960885_rule | CCI-000172 | medium |
| Description | ||||
| Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate temporarily for a designed purpose. When these actions take place, the event needs to be logged. Application servers either provide a local user store, or they integrate with enterprise user stores like LDAP. When the application server provides the user store and enforces authentication, the application server must generate a log record when modification of privileges is successfully or unsuccessfully performed. | ||||
| STIG | Date | |||
| Application Server Security Requirements Guide | 2025-02-11 | |||
Details
Check Text (C-204719r960885_chk)
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to access privileges.
If log records are not generated, this is a finding.
Fix Text (F-4839r282805_fix)
Configure the application server to generate log records when privileges are successfully/unsuccessfully accessed.