Rule ID
SV-241591r879521_rule
Version
V1R2
CCIs
CCI-000067
Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success. As a Tomcat derivative, tc Server can be configured with an “AccessLogValve”. A Valve element represents a component that can be inserted into the request processing pipeline. The Access Log Valve creates log files in the same format as those created by standard web servers.
Navigate to and open /usr/lib/vmware-vcops/tomcat-web-app/conf/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an “AccessLogValve” is not configured correctly or is missing, this is a finding.
Note: The “AccessLogValve” should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>Navigate to and open /usr/lib/vmware-vcops/tomcat-web-app/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The “AccessLogValve” should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>