JBOS-AS-000505 - The JBoss server must be configured to utilize syslog logging.

Information

Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application-specific events, success/fail indications, filenames involved, access control or flow control rules invoked.

Off-loading is a common process in information systems with limited log storage capacity.

Centralized management of log records provides for efficiency in maintenance and management of records, as well as the backup and archiving of those records. Application servers and their related components are required to off-load log records onto a different system or media than the system being logged.

Solution

Log on to the OS of the JBoss server with OS permissions that allow access to JBoss.

Using the relevant OS commands and syntax, cd to the '<JBOSS_HOME>/bin/' folder.

Run the 'jboss-cli' script.
Connect to the server and authenticate.
To add a syslog handler:
Standalone configuration: '/subsystem=logging/syslog-handler=<HANDLER_NAME:add>'
Domain configuration: '/profile=default/subsystem=logging/syslog-handler=<HANDLER_NAME:add>'

To configure a syslog handler:
Standalone configuration. '/subsystem=logging/syslog-handler=<HANDLER_NAME:write-attribute(name=ATTRIBUTE_NAME, value=ATTRIBUTE_VALUE)' Domain configuration. '/profile=default/subsystem=logging/syslog-handler=<HANDLER_NAME:write-attribute(name=ATTRIBUTE_NAME, value=ATTRIBUTE_VALUE)'

*reference the RedHat web-site for the list of syslog handler attributes and corresponding values. Sample attributes include but are not limited to: port, enabled, app-name, level, server-address, hostname, etcetera.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_JBoss_EAP_6-3_V2R5_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), CAT|II, CCI|CCI-001851, Rule-ID|SV-213541r961395_rule, STIG-ID|JBOS-AS-000505, STIG-Legacy|SV-76799, STIG-Legacy|V-62309, Vuln-ID|V-213541

Plugin: Unix

Control ID: 8444d331cdc92f098243202bf71d43e5d39d96c3038ec0168562a8307b0f9e05