1. Home
  2. Security Hardening
  3. DISA IBM WebSphere Traditional 9 STIG V1R1
  4. WBSP-AS-000110 – The WebSphere Application Server audit service provider must be enabled.

WBSP-AS-000110 – The WebSphere Application Server audit service provider must be enabled.

Details

Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.

Remote access by administrators requires that the admin activity be logged.

Application servers provide a web and command line-based remote management capability for managing the application server. Application servers must ensure that all actions related to administrative functionality such as application server configuration are logged.

Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000343-AS-000030

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

In the administrative console, navigate to Security >> Security auditing >> Event type Filters.

Identify and record the event type filter that contains the required ‘Events and Outcomes’.

In the administrative console, click on Security >> Security auditing >> Audit Service Provider [provider name].

Under ‘Selectable filters’, select the filter that was previously identified and recorded.

Click the right arrow to add it to the list.

Click ‘OK’.

Click ‘Save’ to save the changes.

Restart the DMGR and all the JVMs.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles