WBSP-AS-000110 - The WebSphere Application Server audit service provider must be enabled.

Information

Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.

Remote access by administrators requires that the admin activity be logged.

Application servers provide a web and command line-based remote management capability for managing the application server. Application servers must ensure that all actions related to administrative functionality such as application server configuration are logged.

Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000343-AS-000030

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

In the administrative console, navigate to Security >> Security auditing >> Event type Filters.

Identify and record the event type filter that contains the required 'Events and Outcomes'.

In the administrative console, click on Security >> Security auditing >> Audit Service Provider [provider name].

Under 'Selectable filters', select the filter that was previously identified and recorded.

Click the right arrow to add it to the list.

Click 'OK'.

Click 'Save' to save the changes.

Restart the DMGR and all the JVMs.

See Also

http://iasecontent.disa.mil/stigs/zip/U_IBM_WebSphere_Traditional_V9-x_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(9), 800-53|AC-17(1), CAT|II, CCI|CCI-000067, CCI|CCI-002234, Rule-ID|SV-95925r1_rule, STIG-ID|WBSP-AS-000110, Vuln-ID|V-81211

Plugin: Unix

Control ID: a9fda637f3c81c85b37eba2d52933bb177fd0682eec2c44f2ea84e2e8f2e3c71