STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255268

CAT II (Medium)

SSMC web server must initiate session logging upon start up.

Rule ID

SV-255268r960888_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-001464

Discussion

An attacker can compromise a web server during the startup process. If logging is not initiated until all the web server processes are started, key information may be missed and not available during a forensic investigation. To assure all loggable events are captured, the web server must begin logging once the first web server process is initiated.

Check Content

Verify that SSMC is configured to generate log records for system startup and shutdown, system access, and system authentication events. To do so, check if auditd facility (session_log) is enabled:

1. Log on as ssmcadmin to ssmc appliance via SSH. Press "X" to escape to general bash shell.

2. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o session_log -a status
Session log is enabled

If the console output does not show the session log function as enabled, this is a finding.

Fix Text

Configure SSMC to generate log records for system startup and shutdown, system access, and system authentication events. To do so, enable auditd facility (session_log):

1. Log on to SSMC appliance as ssmcadmin. Press "X" to escape to general bash shell from the TUI menu.

2. Execute the following command to enable session logging:

$ sudo /ssmc/bin/config_security.sh -o session_log -a enable