STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255269

CAT II (Medium)

SSMC web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.

Rule ID

SV-255269r960912_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000139

Discussion

Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log data is also essential to system administrators in their daily administrative duties on the hosted system or within the hosted applications. If the logging system begins to fail, events will not be recorded. Organizations must define logging failure events, at which time the application or the logging mechanism the application utilizes will provide a warning to the ISSO and SA at a minimum.

Check Content

Verify that SSMC is configured to provide an alert to the ISSO and SA when log processing failures occur by doing the following:

Execute status check on remote_syslog_appliance security control:
$ sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a status | grep smtp

ssmc.rsyslog.smtp.alert=true
ssmc.rsyslog.smtp.mailFrom=id@domain
ssmc.rsyslog.smtp.recipient=["id1@domain","id2@domain"]
ssmc.rsyslog.smtp.notify-interval=<failure_notify_interval>
ssmc.rsyslog.smtp.server=<smtp_server_ip>
ssmc.rsyslog.smtp.port=<smtp_port>

If the "smtp.alert" is not equal to "true" and the remaining smtp configuration is not established per the site requirements, this is a finding.

Fix Text

Configure SSMC  to provide an alert to the ISSO and SA when log processing failures occur by doing the following:

1. Configure rsyslog parameters in /ssmc/conf/security_config.properties like below (use vi editor) -
ssmc.rsyslog.smtp.alert=true
ssmc.rsyslog.smtp.server=<smtp_server_ip>
ssmc.rsyslog.smtp.port=<smtp_port>
ssmc.rsyslog.smtp.recipient=["id1@domain","id2@domain"]
ssmc.rsyslog.smtp.notify-interval=300
ssmc.rsyslog.smtp.mailFrom=id@domain

2. Execute "sudo /ssmc/bin/config_security.sh -o remote_syslog_appliance -a set -f" to commit the configuration and enable the service.