Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Proposed Required Metadata for Security Events

...

IDDescriptionReference
CON-LOG-REQ-7

...

The container and container application MUST log the field “date/time” in the security audit logs.

...

...

...

CON-LOG-REQ-8

...

The container and container application MUST log the field “protocol” in the security audit logs.

...

...

...

CON-LOG-REQ-9

...

The container and container application MUST log the field “service or program used for access” in the security audit logs.

...

...

...

CON-LOG-REQ-10

...

The container and container application MUST log the field “success/failure” in the security audit logs.

...

...

...

CON-LOG-REQ-11

...

The container and container application MUST log the field “Login ID” in the security audit logs.

...

...

...

CON-LOG-REQ-19

...

The container MUST be capable of automatically synchronizing the system clock daily with the Operator’s trusted time source, to assure accurate time reporting in log files. It is recommended that Coordinated Universal Time (UTC) be used where possible to eliminate ambiguity owing to daylight savings time.

...

...












Best Practices and Risk Analysis for an Operator

...