STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255267

CAT II (Medium)

SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.

Rule ID

SV-255267r986302_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000130CCI-000131CCI-000132CCI-000133CCI-000134CCI-000169CCI-001464

Discussion

Log records can be generated from various components within the web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific web server functionalities may be logged as well. The web server must allow the definition of what events are to be logged. As conditions change, the number and types of events to be logged may change, and the web server must be able to facilitate these changes. The minimum list of logged events should be those pertaining to system startup and shutdown, system access, and system authentication events. If these events are not logged at a minimum, any type of forensic investigation would be missing pertinent information needed to replay what occurred. Satisfies: SRG-APP-000089-WSR-000047, SRG-APP-000093-WSR-000053, SRG-APP-000095-WSR-000056, SRG-APP-000096-WSR-000057, SRG-APP-000097-WSR-000058, SRG-APP-000098-WSR-000059, SRG-APP-000099-WSR-000061, SRG-APP-000092-WSR-000055

Check Content

Verify that SSMC generates log records for system access by doing the following:

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following commands:

a. $ sudo /ssmc/bin/config_security.sh -o  tcp_access_log -a status
TCP access logging is enabled

If the command output does not read "TCP access logging is enabled", this is a finding.

b. $ sudo /ssmc/bin/config_security.sh -o  http_access_log -f -a status
HTTP access logging is enabled

If the command output does not read "HTTP access logging is enabled", this is a finding.

Fix Text

Configure SSMC to generate log records for system access by doing the following:

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following commands:

$ sudo /ssmc/bin/config_security.sh -f -o  tcp_access_log -a enable

$ sudo /ssmc/bin/config_security.sh -f -o  http_access_log -f -a enable