1. Home
  2. Security Hardening
  3. DISA STIG Apache Server 2.4 Unix Server V2R5 Middleware
  4. AS24-U1-000070 – The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events – log_config_module

AS24-U1-000070 – The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events – log_config_module

Details

Log records can be generated from various components within the Apache web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific Apache web server functionalities may be logged as well. The Apache web server must allow the definition of what events are to be logged. As conditions change, the number and types of events to be logged may change, and the Apache web server must be able to facilitate these changes.

The minimum list of logged events should be those pertaining to system startup and shutdown, system access, and system authentication events. If these events are not logged at a minimum, any type of forensic investigation would be missing pertinent information needed to replay what occurred.

Satisfies: SRG-APP-000089-WSR-000047, SRG-APP-000092-WSR-000055, SRG-APP-000095-WSR-000056, SRG-APP-000096-WSR-000057, SRG-APP-000097-WSR-000058, SRG-APP-000098-WSR-000059, SRG-APP-000099-WSR-000061, SRG-APP-000100-WSR-000064

Solution

Determine the location of the ‘HTTPD_ROOT’ directory and the ‘httpd.conf’ file:

# httpd -V | egrep -i ‘httpd_root|server_config_file’
-D HTTPD_ROOT=’/etc/httpd’
-D SERVER_CONFIG_FILE=’conf/httpd.conf’

Uncomment the ‘log_config_module’ module line.

Configure the ‘LogFormat’ in the ‘httpd.conf’ file to look like the following:

LogFormat ‘%a %A %h %H %l %m %s %t %u %U ‘%{Referer}i’ ‘ common

Restart Apache: apachectl restart

NOTE: Your log format may be using different variables based on your environment, however it should be verified to be producing the same end result of logged elements.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles