...
These below refer to the ONAP (Application and Infrastructure Columns)
Proposed Logging Practice Requirements
ID | Description | Reference |
---|---|---|
CON-LOG-REQ-19 | The container MUST be capable of automatically synchronizing the system clock daily with the Operator’s trusted time source, to assure accurate time reporting in log files. It is recommended that Coordinated Universal Time (UTC) be used where possible to eliminate ambiguity owing to daylight savings time. | R-629534 |
Proposed Security Event Generation Requirements
...
ID | Description | Reference |
---|---|---|
CON-LOG-REQ- |
...
1 | The container and container application MUST log successful and unsuccessful authentication attempts, e.g., authentication associated with a transaction, authentication to create a session, authentication to assume elevated privilege. |
...
...
...
CON-LOG-REQ- |
...
2 | The container and container application MUST log logoffs. |
...
...
...
CON-LOG-REQ- |
...
3 | The container and container application MUST log starting and stopping of security logging. |
...
...
...
CON-LOG-REQ- |
...
4 | The container and container application MUST log success and unsuccessful creation, removal, or change to the inherent privilege level of users. |
...
...
...
CON-LOG-REQ- |
...
5 | The container and container application MUST log connections to the network listeners of the container. |
...
...
...
CON-LOG-REQ-6 |
...
The container and container application MUST log the addition and deletion of files in the container. |
Proposed Required Metadata for Security Events
ID | Description | Reference |
---|---|---|
CON-LOG-REQ-7 | The container and container application MUST log the field “date/time” in the security audit logs. | R-97445 |
CON-LOG-REQ-8 | The container and container application MUST log the field “protocol” in the security audit logs. | R-25547 |
CON-LOG-REQ-9 | The container and container application MUST log the field “service or program used for access” in the security audit logs. | R-06413 |
CON-LOG-REQ-10 | The container and container application MUST log the field “success/failure” in the security audit logs. | R-15325 |
CON-LOG-REQ-11 | The container and container application MUST log the field “Login ID” in the security audit logs. | R-89474 |
CON-LOG-REQ-19
Best Practices and Risk Analysis for an Operator
...