STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Application Server Security Requirements Guide

V-204723

CAT II (Medium)

The application server must produce log records containing sufficient information to establish where the events occurred.

Rule ID

SV-204723r960897_rule

STIG

Application Server Security Requirements Guide

Version

V4R4

CCIs

CCI-000132

Discussion

Application server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the correct location or process within the application server where the events occurred is important during forensic analysis. To determine where an event occurred, the log data must contain information that identifies the source and destination of the events such as application components, modules, filenames, host names, servlets, containers, API’s, and other functionality.

Check Content

Review the configuration settings on the application server to determine if the application server is configured to log information that establishes where within the application server the event occurred. 

The data in the log file should identify the event, the component, module, filename, host name, servlets, containers, API’s, or other functionality within the application server, as well as, any source and destination information that indicates where an event occurred.

If the application server is not configured to log where within the application server the event took place, this is a finding.

Fix Text

Configure the application server logging system to log where the event took place.