JBOS-AS-000175 - File permissions must be configured to protect log information from unauthorized deletion.


If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve.

When not configured to use a centralized logging solution like a syslog server, the JBoss EAP application server writes log data to log files that are stored on the OS, appropriate file permissions must be used to restrict deletion.

Logon formation includes all information (e.g., log records, log settings, transaction logs, and log reports) needed to successfully log information system activity. Application servers must protect log information from unauthorized deletion.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.


Configure the OS file permissions on the application server to protect log information from unauthorized deletion.

See Also


Item Details


References: 800-53|AU-9, CAT|II, CCI|CCI-000164, Rule-ID|SV-213515r615939_rule, STIG-ID|JBOS-AS-000175, STIG-Legacy|SV-76745, STIG-Legacy|V-62255, Vuln-ID|V-213515

Plugin: Unix

Control ID: 395c6f30946ce5573e9ac55c7f9fecdb93dcbb8144fe927fc6ec50d29dc8cbc0