STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM WebSphere Traditional V9.x Security Technical Implementation Guide

V-255844

CAT III (Low)

The WebSphere Application Server must alert the SA and ISSO, at a minimum, in the event of a log processing failure.

Rule ID

SV-255844r960912_rule

STIG

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000139

Discussion

Logs are essential to monitor the health of the system, investigate changes that occurred to the system, or investigate a security incident. When log processing fails, the events during the failure can be lost. To minimize the timeframe of the log failure, an alert needs to be sent to the SA and ISSO at a minimum. Log processing failures include, but are not limited to, failures in the application server log capturing mechanisms or log storage capacity being reached or exceeded. In some instances, it is preferred to send alarms to individuals rather than to an entire group. Application servers must be able to trigger an alarm and send an alert to, at a minimum, the SA and ISSO in the event there is an application server log processing failure.

Check Content

If the SA and ISSO are notified of log processing failures via an alternative notification process, this is not a finding.

In the administrative console, navigate to Security >> Security auditing >> Audit monitor.

If "Enabled monitoring" is not checked and "Monitor notification" is not set to a notification in the notifications list, that includes the SA and ISSO, this is a finding.

Fix Text

Establish and utilize a notification process for WebSphere log events or configure WebSphere to send log event alerts via email.

In the administrative console, navigate to Security >> Security auditing >> Audit monitor.

Click on "New" button.

Specify a unique name for the new notification name.

Click "Message log" checkbox.

Select "Email sent to notification list".

Enter SA and ISSO emails in the "Email address to add" field.

Enter the mail server address in the "Outgoing mail (STMP) server" field.

Click ">" to put email in "List of email addresses" field.

Click "OK".

Select the "Enable monitoring" check box to turn on audit failure notifications.

Select the notification configuration to be used from the "Monitor notification" dropdown menu.

Click "OK".

Click "Save".