STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Application Server Security Requirements Guide

V-204725

CAT II (Medium)

The application server must produce log records that contain sufficient information to establish the outcome of events.

Rule ID

SV-204725r960903_rule

STIG

Application Server Security Requirements Guide

Version

V4R4

CCIs

CCI-000134

Discussion

Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to, time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application-specific events, success/fail indications, filenames involved, access control or flow control rules invoked. Success and failure indicators ascertain the outcome of a particular application server event or function. As such, they also provide a means to measure the impact of an event and help authorized personnel to determine the appropriate response. Event outcome may also include event-specific results (e.g., the security state of the information system after the event occurred).

Check Content

Review application server documentation and the log files on the application server to determine if the logs contain information that establishes the outcome of event data.

If the application server is not configured to meet this requirement, this is a finding.

Fix Text

Configure the application server logging system to log the event outcome.