STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM WebSphere Traditional V9.x Security Technical Implementation Guide

V-255821

CAT II (Medium)

The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.

Rule ID

SV-255821r960765_rule

STIG

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000067CCI-002234

Discussion

Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by administrators requires that the admin activity be logged. Application servers provide a web and command line-based remote management capability for managing the application server. Application servers must ensure that all actions related to administrative functionality such as application server configuration are logged. Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000343-AS-000030

Check Content

Review System Security Plan documentation.

Identify groups and roles.

In the administrative console, navigate to Users and Groups >> Administrative Group Roles.

Check the roles for each group and compare to System Security Plan.

If any group is not authorized by the ISSO/ISSM to be in an auditor role, this is a finding.

Fix Text

Document all groups in an Auditor role in the security plan.

In the administrative console, navigate to Users and Groups >> Administrative group roles.

If an unauthorized group is in the auditor role, remove the auditor role from the group.

Restart the DMGR and all the JVMs.