SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.

From MS SharePoint 2013 Security Technical Implementation Guide

Part of SRG-APP-000090

Associated with: CCI-000171

SV-74383r1_rule SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.

Vulnerability discussion

Audit records can be generated from various components within the information system, such as network interfaces, hard disks, modems, etc. From an application perspective, certain specific application functionalities may be audited as well.The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records (i.e., auditable events, time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, filenames involved, and access control or flow control rules invoked).Organizations may define the organizational personnel accountable for determining which application components shall provide auditable events.

Check content

Review the SharePoint server configuration to ensure designated organizational personnel are allowed to select which auditable events are to be audited by specific components of the system. Navigate to Central Administration. Click "Monitoring". Click "Configure Diagnostic Logging". Validate that the selected event categories and trace levels match those defined by the organization's system security plan. Remember that a base set of events are always audited. If the selected event categories/trace levels are inconsistent with those defined in the organization's system security plan, this is a finding.

Fix text

Configure the SharePoint server configuration to allow designated organizational personnel to select which auditable events are to be audited by specific components of the system. Navigate to Central Administration. Click "Monitoring". Click "Configure Diagnostic Logging". Select the event categories and trace levels to match those defined by the organization's system security plan. Remember that a base set of events is always audited. Click "Ok".

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer