Details
After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event.
Satisfies: SRG-APP-000095-WSR-000056, SRG-APP-000096-WSR-000057, SRG-APP-000097-WSR-000058, SRG-APP-000098-WSR-000059, SRG-APP-000099-WSR-000061, SRG-APP-000100-WSR-000064, SRG-APP-000374-WSR-000172, SRG-APP-000375-WSR-000171
Solution
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf.
Comment any existing accesslog.format lines by adding a '#' at the beginning of the line.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-3
- 800-53|AU-8b.
- CAT|II
- CCI|CCI-000130
- CCI|CCI-000131
- CCI|CCI-000132
- CCI|CCI-000133
- CCI|CCI-000134
- CCI|CCI-001487
- CCI|CCI-001889
- CCI|CCI-001890
- Rule-ID|SV-239720r679270_rule
- STIG-ID|VCLD-67-000006
- Vuln-ID|V-239720
Comments
Please sign in to leave a comment.