V-204719
SV-204719r960885_rule
CAT II
The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
From: Application Server Security Requirements Guide (V4R4)
Description
<VulnDiscussion>Accessing a subject's privileges can be used to elevate a lower-privileged subject's privileges temporarily in order to cause harm to the application server or to gain privileges to operate temporarily for a designed purpose. When these actions take place, the event needs to be logged.
Application servers either provide a local user store, or they integrate with enterprise user stores like LDAP. When the application server provides the user store and enforces authentication, the application server must generate a log record when modification of privileges is successfully or unsuccessfully performed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
Check Procedure
Review the application server documentation and the system configuration to determine if the application server generates log records when successful/unsuccessful attempts are made to access privileges.
If log records are not generated, this is a finding.
Fix Text
Configure the application server to generate log records when privileges are successfully/unsuccessfully accessed.
CCI Reference
CCI-000172- Created
- 2026-04-07 20:08:11
- Last Updated
- 2026-04-07 20:08:11