Skip to main content
CUI

STIG Rule - V-206509

V-206509

SV-206509r1188311_rule

CAT I

The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.

From: Central Log Server Security Requirements Guide (V3R4)

Description

<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communications can be intercepted and read or altered. This requirement applies only to applications that are either distributed or can allow access to data nonlocally, for example, forwarding to SIEM systems. When transmitting data, applications need to leverage transmission protection mechanisms, such as TLS, SSL VPNs, or IPSEC.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Examine the configuration. Verify the Central Log Server is configured to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function. If the Central Log Server is not configured to protect the confidentiality and integrity of transmitted information, this is a finding.

Fix Text

Configure the Central Log Server to use transmission protection mechanisms, such as TLS, SSL VPNs, or IPsec along with integrity protections such as FIPS 140-2 validated digital signature and hash function.

CCI Reference

CCI-002418
Created
2026-04-07 20:08:13
Last Updated
2026-04-07 20:08:13
CUI