1. Home
  2. Security Hardening
  3. DISA STIG Apache Server 2.4 Unix Server V2R5 Middleware
  4. AS24-U1-000160 – The Apache web server must use a logging mechanism that is configured to alert the Information System Security Officer (ISSO) and System Administrator (SA) in the event of a processing failure.

AS24-U1-000160 – The Apache web server must use a logging mechanism that is configured to alert the Information System Security Officer (ISSO) and System Administrator (SA) in the event of a processing failure.

Details

Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log data is also essential to SAs in their daily administrative duties on the hosted system or within the hosted applications.

If the logging system begins to fail, events will not be recorded. Organizations must define logging failure events, at which time the application or the logging mechanism the application uses will provide a warning to the ISSO and SA at a minimum.

Satisfies: SRG-APP-000108-WSR-000166, SRG-APP-000359-WSR-000065

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Work with the SIEM administrator to configure an alert when no audit data is received from Apache based on the defined schedule of connections.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles