WBSP-AS-000080 - WebSphere Application Server groups mapped to WebSphere auditor roles must be configured in accordance with security plan

Information

Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.

Remote access by administrators requires that the admin activity be logged.

Application servers provide a web and command line-based remote management capability for managing the application server. Application servers must ensure that all actions related to administrative functionality such as application server configuration are logged.

Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000343-AS-000030

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Document all groups in an Auditor role in the security plan.

In the administrative console, navigate to Users and Groups >> Administrative group roles.

If an unauthorized group is in the auditor role, remove the auditor role from the group.

Restart the DMGR and all the JVMs.

See Also

http://iasecontent.disa.mil/stigs/zip/U_IBM_WebSphere_Traditional_V9-x_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(9), 800-53|AC-17(1), CAT|II, CCI|CCI-000067, CCI|CCI-002234, Rule-ID|SV-95919r1_rule, STIG-ID|WBSP-AS-000080, Vuln-ID|V-81205

Plugin: Unix

Control ID: 8e475e89d44db28d3ba34a8c085ddad52ec591c0ee2ca199cf3f3ebe7e78b998