Details
Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application-specific events, success/fail indications, filenames involved, access control or flow control rules invoked.
Success and failure indicators ascertain the outcome of a particular application server event or function. As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Event outcome may also include event-specific results (e.g., the security state of the information system after the event occurred).
Solution
Launch the jboss-cli management interface.
Connect to the server by typing ‘connect’, authenticate as a user in the Superuser role, and run the following command:
For a Managed Domain configuration:
‘host=master/server/
For a Standalone configuration:
‘/core-service=management/access=audit/logger=audit-log:write-attribute(name=enabled,value=true)’
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-3
- CAT|II
- CCI|CCI-000134
- Rule-ID|SV-213511r615939_rule
- STIG-ID|JBOS-AS-000130
- STIG-Legacy|SV-76737
- STIG-Legacy|V-62247
- Vuln-ID|V-213511