STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Central Log Server Security Requirements Guide

V-206501

CAT III (Low)

The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.

Rule ID

SV-206501r961425_rule

STIG

Central Log Server Security Requirements Guide

Version

V3R4

CCIs

CCI-001880

Discussion

If the report generation capability does not support after-the-fact investigations, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack or identify those responses for one. This capability is also required to comply with applicable Federal laws and DoD policies. The report generation capability must support after-the-fact investigations of security incidents either natively or through the use of third-party tools. This requirement is specific to applications with report generation capabilities; however, applications need to support on-demand reporting requirements.

Check Content

Examine the configuration.

Verify the Central Log Server generates reports that support after-the-fact investigations of security incidents.

If the Central Log Server is not configured to generate reports that support after-the-fact investigations of security incidents, this is a finding.

Fix Text

Configure the Central Log Server to generate reports that support after-the-fact investigations of security incidents.