STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM WebSphere Traditional V9.x Security Technical Implementation Guide

V-255823

CAT II (Medium)

The WebSphere Application Server audit event type filters must be configured.

Rule ID

SV-255823r960765_rule

STIG

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000067CCI-000130CCI-000132CCI-000133CCI-000134CCI-000135CCI-000169CCI-000172CCI-001462CCI-001487CCI-001814CCI-002234

Discussion

Logging must be utilized in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident. Remote access by administrators requires that the admin activity be logged. Application servers provide a web and command line-based remote management capability for managing the application server. Application servers must ensure that all actions related to administrative functionality such as application server configuration are logged. Satisfies: SRG-APP-000016-AS-000013, SRG-APP-000343-AS-000030, SRG-APP-000089-AS-000050, SRG-APP-000495-AS-000220, SRG-APP-000499-AS-000224, SRG-APP-000503-AS-000228, SRG-APP-000504-AS-000229, SRG-APP-000505-AS-000230, SRG-APP-000506-AS-000231, SRG-APP-000093-AS-000054, SRG-APP-000095-AS-000056, SRG-APP-000097-AS-000060, SRG-APP-000098-AS-000061, SRG-APP-000099-AS-000062, SRG-APP-000100-AS-000063, SRG-APP-000101-AS-000072, SRG-APP-000381-AS-000089, SRG-APP-000080-AS-000045

Check Content

In the administrative console, navigate to Security >> Security auditing >> Event type Filters.

Verify the following events and outcomes are enabled in the "Events and Outcomes" box. Also note the name of the filter associated with these events. This name will be referenced in STIG ID WBSP-AS-000110.

AUTHN: 
SUCCESS,INFO,WARNING,ERROR,DENIED,REDIRECT

AUTHZ: 
SUCCESS,INFO,WARNING,ERROR,DENIED,REDIRECT

AUTHN_TERMINATE:
SUCCESS,INFO,WARNING,ERROR,DENIED,REDIRECT

REPOSITORY_SAVE: SUCCESS,INFO,WARNING,ERROR,DENIED,REDIRECT

If these audit filters are not configured in "Events and Outcomes", this is a finding.

Fix Text

In the administrative console, navigate to Security >> Security auditing >> Event type Filters.

Click the "New" button to create a new filter; give it a unique name. 

Select SECURITY_AUTHN, SECURITY_AUTHZ, SECURITY_AUTHN_TERMINATE, and ADMIN_REPOSITORY_SAVE from "Selectable events".

Add them to the "Enabled events" box by clicking on the right arrow. 

Select INFO, ERROR, SUCCESS, DENIED, REDIRECT, and WARNING from the "Selectable event outcomes" box.

Click the right arrow to fill in "Enabled events outcomes" box.

Click "OK". 

Restart the DMGR and all the JVMs.