Details
The Security Token Service produces a number of logs that must be offloaded from the originating system. This information can then be used for diagnostic, forensics, or other purposes relevant to ensuring the availability and integrity of the hosted application.
Satisfies: SRG-APP-000358-WSR-000163, SRG-APP-000125-WSR-000071
Solution
Navigate to and open /etc/vmware-syslog/stig-services-sso.conf.
Create the file if it does not exist.
Set the contents of the file as follows:
input(type=’imfile’
File=’/var/log/vmware/sso/*.log’
Tag=’vmidentity’
PersistStateInterval=’200′
Severity=’info’
Facility=’local0′)
input(type=’imfile’
File=’/var/log/vmware/sso/sts-runtime.log.*’
Tag=’sts-runtime’
PersistStateInterval=’200′
Severity=’info’
Facility=’local0′)
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-4(1)
- 800-53|AU-9(2)
- CAT|II
- CCI|CCI-001348
- CCI|CCI-001851
- Rule-ID|SV-239678r679106_rule
- STIG-ID|VCST-67-000027
- Vuln-ID|V-239678