Ensure the audit Subsystem is Installed
Ensure auditd Collects Information on Exporting to Media (successful)
Ensure auditd Collects System Administrator Actions
Record Events that Modify User/Group Information
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Record Events that Modify the System's Discretionary Access Controls - umount
Record Events that Modify the System's Discretionary Access Controls - umount2
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Ensure the audit-libs package as a part of audit Subsystem is Installed
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Any Attempts to Run chcon
Record Any Attempts to Run setsebool
Record Attempts to Alter Logon and Logout Events - lastlog
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - insmod
Ensure auditd Collects Information on the Use of Privileged Commands - kmod
Ensure auditd Collects Information on the Use of Privileged Commands - modprobe
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - rmmod
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects System Administrator Actions - /etc/sudoers
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/
Record Any Attempts to Run chacl
Record Any Attempts to Run setfacl
Record Any Attempts to Run ssh-agent
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update
Ensure auditd Collects Information on the Use of Privileged Commands - usermod
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Record Any Attempts to Run chmod
Record Any Attempts to Run rm
Record Attempts to Alter Logon and Logout Events - faillog
Ensure auditd Collects Information on the Use of Privileged Commands - chfn
Ensure auditd Collects Information on the Use of Privileged Commands - passmass
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
AAA Services configuration audit records must identify what type of events occurred.
The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
The ALG must produce audit records containing information to establish what type of events occurred.
The Arista Multilayer Switch must produce audit log records containing sufficient information to establish what type of event occurred.
The application server must produce log records containing information to establish what type of events occurred.
The Arista network device must be configured to capture all DOD auditable events.
The application must log application shutdown events.
The application must log destination IP addresses.
The application must log user actions involving access to data.
The application must log user actions involving changes to data.
The print-severity variable for the configuration of BIND 9.x server logs must be configured to produce audit records containing information to establish what type of events occurred.
The Central Log Server must produce audit records containing information to establish what type of events occurred.
The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on criticality level, event type, and/or retention period, at a minimum.
The DBN-6300 must produce audit log records containing sufficient information to establish what type of event occurred.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
The DNS server implementation must produce audit records containing information to establish what type of events occurred.
The firewall must generate traffic log entries containing information to establish what type of events occurred.
The FortiGate firewall must generate traffic log entries containing information to establish what type of events occurred.
The HP FlexFabric Switch must produce audit log records containing sufficient information to establish what type of event occurred.
The HYCU server must initiate session auditing upon startup and produce audit log records containing sufficient information to establish what type of event occurred.
The MQ Appliance messaging server must produce log records containing information to establish what type of events occurred.
The WebSphere Liberty Server must log remote session and security activity.
The MQ Appliance network device must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
The WebSphere Application Server audit event type filters must be configured.
CA VM:Secure product must be installed and operating.
The IDPS must produce audit records containing sufficient information to establish what type of event occurred, including, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, and criticality level/alert code or description.
JBoss must be configured to log the IP address of the remote system connecting to the JBoss system/cluster.
JBoss must be configured to produce log records containing information to establish what type of events occurred.
The Sentry must produce audit records containing information to establish what type of events occurred.
The Mainframe Product must produce audit records containing information to establish what type of events occurred.
The network device must produce audit log records containing sufficient information to establish what type of event occurred.
Nutanix AOS must produce audit records containing information to establish what type of events occurred.
OHS must have a log level severity defined to produce sufficient log records to establish what type of events occurred.
OHS must have a log format defined for log records generated to capture sufficient information to establish what type of events occurred.
OHS must have a SSL log format defined for log records generated to capture sufficient information to establish what type of events occurred.
OHS must have a log file defined for each site/virtual host to capture sufficient information to establish what type of events occurred.
Oracle WebLogic must produce process events and severity levels to establish what type of HTTPD-related events and severity levels occurred.
Oracle WebLogic must produce audit records containing sufficient information to establish what type of JVM-related events and severity levels occurred.
Oracle WebLogic must produce process events and security levels to establish what type of Oracle WebLogic process events and severity levels occurred.
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
The SDN controller must be configured to produce audit records containing information to establish what type of events occurred.
Innoslate must generate comprehensive audit records.
Symantec ProxySG must produce audit records containing information to establish what type of events occurred.
The SMS must produce audit records containing sufficient information to establish what type of event occurred, including, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, and criticality level/alert code or description by sending all audit and system logs to a centralized syslog server.
The UEM server must be configured to produce audit records containing information to establish what type of events occurred.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The VPN Gateway must generate log records containing information to establish what type of events occurred.
Audit records content must contain valid information to allow for proper incident reporting.
The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
AccessLogValve must be configured for each application context.
AccessLogValve must be configured per each virtual host.
The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.
The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
The macOS system must enable security auditing.
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
The Cisco ASA must be configured to generate traffic log entries containing information to establish what type of events occurred.
PostgreSQL must produce audit records containing sufficient information to establish what type of events occurred.
The Cisco ASA must be configured to produce audit log records containing sufficient information to establish what type of event occurred.
The DBMS must produce audit records containing sufficient information to establish what type of events occurred.
All audit records must identify what type of event has occurred within the container platform.
The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish what type of events occurred.
The operating system must produce audit records containing information to establish what type of events occurred.
SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
AIX must produce audit records containing information to establish what the date, time, and type of events that occurred.
IBM z/OS required SMF data record types must be collected.
The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
The Juniper device must be configured to produce audit log records containing sufficient information to establish what type of event occurred.
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
MariaDB must produce audit records containing sufficient information to establish what type of events occurred.
MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
Event tracing for Windows (ETW) for Common Language Runtime events must be enabled.
Windows 10 must be configured to audit Other Policy Change Events Failures.
Windows 10 must be configured to audit other Logon/Logoff Events Successes.
Windows 10 must be configured to audit other Logon/Logoff Events Failures.
Windows 10 must be configured to audit Detailed File Share Failures.
Windows 10 must be configured to audit MPSSVC Rule-Level Policy Change Successes.
Windows 10 must be configured to audit MPSSVC Rule-Level Policy Change Failures.
Windows 11 must be configured to audit Other Policy Change Events Successes.
Windows 11 must be configured to audit Other Policy Change Events Failures.
Windows 11 must be configured to audit other Logon/Logoff Events Successes.
Windows 11 must be configured to audit other Logon/Logoff Events Failures.
Windows 11 must be configured to audit Detailed File Share Failures.
Windows 11 must be configured to audit MPSSVC Rule-Level Policy Change Successes.
Windows 11 must be configured to audit MPSSVC Rule-Level Policy Change Failures.
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The Oracle Linux operating system must audit all uses of the su command.
The Oracle Linux operating system must audit all uses of the sudo command.
The Oracle Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Oracle Linux operating system must audit all uses of the newgrp command.
The Oracle Linux operating system must audit all uses of the chsh command.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OL 8 must generate audit records for any use of the "su" command.
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
OL 8 must generate audit records for any use of the "chage" command.
OL 8 must generate audit records for any uses of the "chcon" command.
OL 8 must generate audit records for any use of the "ssh-agent" command.
OL 8 must generate audit records for any use of the "passwd" command.
OL 8 must generate audit records for any use of the "mount" command.
OL 8 must generate audit records for any use of the "umount" command.
OL 8 must generate audit records for any use of the "mount" syscall.
OL 8 must generate audit records for any use of the "unix_update" command.
OL 8 must generate audit records for any use of the "postdrop" command.
OL 8 must generate audit records for any use of the "postqueue" command.
OL 8 must generate audit records for any use of the "setsebool" command.
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
OL 8 must generate audit records for any use of the "ssh-keysign" command.
OL 8 must generate audit records for any use of the "setfacl" command.
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
OL 8 must generate audit records for any use of the "newgrp" command.
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
OL 8 must generate audit records for any use of the "gpasswd" command.
OL 8 must generate audit records for any use of the delete_module syscall.
OL 8 must generate audit records for any use of the "crontab" command.
OL 8 must generate audit records for any use of the "chsh" command.
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
OL 8 must generate audit records for any use of the "sudo" command.
OL 8 must generate audit records for any use of the "usermod" command.
OL 8 must generate audit records for any use of the "chacl" command.
OL 8 must generate audit records for any use of the "kmod" command.
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
OL 8 must enable auditing of processes that start prior to the audit daemon.
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
MySQL Database Server 8.0 must produce audit records containing sufficient information to establish what type of events occurred.
The Automation Controller must generate the appropriate log records.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
All audit records must identify what type of event has occurred within OpenShift.
The Red Hat Enterprise Linux operating system must audit all uses of the su command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudo command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.
The Red Hat Enterprise Linux operating system must audit all uses of the chsh command.
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The SUSE operating system must generate audit records for all uses of the su command.
The SUSE operating system must generate audit records for all uses of the sudo command.
The SUSE operating system must generate audit records for all uses of the chfn command.
The SUSE operating system must generate audit records for all uses of the mount command.
The SUSE operating system must generate audit records for all uses of the umount command.
The SUSE operating system must generate audit records for all uses of the ssh-agent command.
The SUSE operating system must generate audit records for all uses of the ssh-keysign command.
The SUSE operating system must generate audit records for all uses of the kmod command.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the gpasswd command.
The SUSE operating system must generate audit records for all uses of the newgrp command.
The SUSE operating system must generate audit records for a uses of the chsh command.
The SUSE operating system must generate audit records for all uses of the chmod command.
The SUSE operating system must generate audit records for all uses of the setfacl command.
The SUSE operating system must generate audit records for all uses of the chacl command.
Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
The SUSE operating system must generate audit records for all uses of the rm command.
The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
The SUSE operating system must generate audit records for all modifications to the lastlog file.
The SUSE operating system must generate audit records for all uses of the passmass command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd command.
The SUSE operating system must generate audit records for all uses of the chage command.
The SUSE operating system must generate audit records for all uses of the usermod command.
The SUSE operating system must generate audit records for all uses of the crontab command.
The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
The SUSE operating system must generate audit records for all uses of the delete_module command.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
The SUSE operating system must generate audit records for all modifications to the faillog file.
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
RHEL 9 audit package must be installed.
RHEL 9 audit service must be enabled.
RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL 9 must audit all uses of umount system calls.
RHEL 9 must audit all uses of the chacl command.
RHEL 9 must audit all uses of the setfacl command.
RHEL 9 must audit all uses of the chcon command.
RHEL 9 must audit all uses of the semanage command.
RHEL 9 must audit all uses of the setfiles command.
RHEL 9 must audit all uses of the setsebool command.
RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL 9 must audit all uses of the delete_module system call.
RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL 9 must audit all uses of the chage command.
RHEL 9 must audit all uses of the chsh command.
RHEL 9 must audit all uses of the crontab command.
RHEL 9 must audit all uses of the gpasswd command.
RHEL 9 must audit all uses of the kmod command.
RHEL 9 must audit all uses of the newgrp command.
RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL 9 must audit all uses of the passwd command.
RHEL 9 must audit all uses of the postdrop command.
RHEL 9 must audit all uses of the postqueue command.
RHEL 9 must audit all uses of the ssh-agent command.
RHEL 9 must audit all uses of the ssh-keysign command.
RHEL 9 must audit all uses of the su command.
RHEL 9 must audit all uses of the sudo command.
RHEL 9 must audit all uses of the sudoedit command.
RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL 9 must audit all uses of the unix_update command.
RHEL 9 must audit all uses of the userhelper command.
RHEL 9 must audit all uses of the usermod command.
RHEL 9 must audit all uses of the mount command.
Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd or unix2_chkpwd commands.
The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.
The SUSE operating system must generate audit records for all uses of the sudoedit command.
The SUSE operating system must generate audit records for all uses of the mount system call.
The SUSE operating system must generate audit records for all uses of the umount system call.
The SUSE operating system must generate audit records for all uses of the insmod command.
The SUSE operating system must generate audit records for all uses of the rmmod command.
The SUSE operating system must generate audit records for all uses of the modprobe command.
The SUSE operating system must generate audit records for all uses of the chcon command.
The SUSE operating system must generate audit records for all uses of the delete_module system call.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
Audit records must include what type of events occurred.
The VMM must produce audit records containing information to establish what type of events occurred.
The ESXi host must produce audit records containing information to establish what type of events occurred.
VAMI must produce log records containing sufficient information to establish what type of events occurred.
Performance Charts must record user access in a format that enables monitoring of remote access.
The vCenter Server must produce audit records containing information to establish what type of events occurred.
ESX Agent Manager must record user access in a format that enables monitoring of remote access.
Lookup Service must record user access in a format that enables monitoring of remote access.
The ESXi must produce audit records containing information to establish what type of events occurred.
The ESXi host must forward audit records containing information to establish what type of events occurred.
The Photon operating system must configure auditd to log to disk.
The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
VMware Postgres log files must contain required fields.
The Security Token Service must record user access in a format that enables monitoring of remote access.
The vCenter Lookup service must produce log records containing sufficient information regarding event details.
vSphere UI must record user access in a format that enables monitoring of remote access.
The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
The vCenter PostgreSQL service must produce logs containing sufficient information to establish what type of events occurred.
The vCenter STS service must produce log records containing sufficient information regarding event details.
The vCenter UI service must produce log records containing sufficient information regarding event details.
The vCenter VAMI service must produce log records containing sufficient information to establish what type of events occurred.
The web server must produce log records containing sufficient information to establish what type of events occurred.
The BIG-IP AFM module must be configured to produce audit records containing information to establish what type of events occurred.
The BIG-IP ASM module must be configured to produce ASM Event Logs containing information to establish what type of unauthorized events occurred.
Ubuntu 22.04 LTS must have the "auditd" package installed.
Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to produce session (call detail) records containing what type of connection occurred.
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
The Enterprise Voice, Video, and Messaging Session Manager must produce session (call) records containing the type of session connection.
The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
The OL 8 audit package must be installed.
SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
SLEM 5 must generate audit records for all uses of the "chacl" command.
SLEM 5 must generate audit records for all uses of the "chage" command.
SLEM 5 must generate audit records for all uses of the "chcon" command.
SLEM 5 must generate audit records for all uses of the "chfn" command.
SLEM 5 must generate audit records for all uses of the "chmod" command.
SLEM 5 must generate audit records for a uses of the "chsh" command.
SLEM 5 must generate audit records for all uses of the "crontab" command.
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
SLEM 5 must generate audit records for all uses of the "insmod" command.
SLEM 5 must generate audit records for all uses of the "kmod" command.
SLEM 5 must generate audit records for all uses of the "modprobe" command.
SLEM 5 must generate audit records for all uses of the "newgrp" command.
SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
SLEM 5 must generate audit records for all uses of the "passwd" command.
SLEM 5 must generate audit records for all uses of the "rm" command.
SLEM 5 must generate audit records for all uses of the "rmmod" command.
SLEM 5 must generate audit records for all uses of the "setfacl" command.
SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
SLEM 5 must generate audit records for all uses of the "su" command.
SLEM 5 must generate audit records for all uses of the "sudo" command.
SLEM 5 must generate audit records for all uses of the "sudoedit" command.
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
SLEM 5 must generate audit records for all uses of the "usermod" command.
SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
SLEM 5 must generate audit records for all uses of the "delete_module" system call.
SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
SLEM 5 must generate audit records for all uses of the "mount" system call.
SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
SLEM 5 must generate audit records for all uses of the "umount" system call.
SLEM 5 must generate audit records for all modifications to the "lastlog" file.
SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record.
Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of postdrop in TOSS must generate an audit record.
Successful/unsuccessful uses of postqueue in TOSS must generate an audit record.
Successful/unsuccessful uses of setsebool in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record.
Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record.
Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record.
Successful/unsuccessful uses of setfiles in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record.
The NSX Distributed Firewall must generate traffic log entries.
The NSX Tier-0 Gateway Firewall must generate traffic log entries.