CCI-000133
Ensure that audit records containing information that establishes the source of the event.
7 rules found Severity: Medium

2 rules found Severity: Medium

The A10 Networks ADC, when used to load balance web applications, must enable external logging for accessing Web Application Firewall data event messages.
1 rule found Severity: Low

The A10 Networks ADC must produce audit log records containing information (FQDN, unique hostname, management or loopback IP address) to establish the source of events.
1 rule found Severity: Low

The CA API Gateway must produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

The DBN-6300 must produce audit log records containing information to establish the source of events.
1 rule found Severity: Low

The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
1 rule found Severity: Medium

The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
1 rule found Severity: Medium

The FortiGate firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
1 rule found Severity: Low

The HP FlexFabric Switch must produce audit log records containing information to establish the source of events.
1 rule found Severity: Low

The HYCU server must produce audit records containing information to establish when events occurred, where events occurred, the source of the event, the outcome of the event, and identity of any individual or process associated with the event.
1 rule found Severity: Medium

The MQ Appliance messaging server must produce log records containing information to establish what type of events occurred.
1 rule found Severity: Medium

The MQ Appliance network device must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Low

SQL Server must produce Trace or Audit records containing sufficient information to establish the sources (origins) of the events.
1 rule found Severity: Medium

1 rule found Severity: Medium

OHS must have a log format defined for log records that allow the establishment of the source of events.
1 rule found Severity: Medium

OHS must have a SSL log format defined for log records that allow the establishment of the source of events.
1 rule found Severity: Medium

OHS must have a log file defined for each site/virtual host to capture logs generated that allow the establishment of the source of events.
1 rule found Severity: Medium

OHS, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
1 rule found Severity: Medium

OHS, behind a load balancer or proxy server, must have the SSL log format set correctly to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
1 rule found Severity: Medium

OHS, behind a load balancer or proxy server, must have a log file defined for each site/virtual host to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
1 rule found Severity: Medium

Oracle WebLogic must produce audit records containing sufficient information to establish the sources of the events.
1 rule found Severity: Low

Symantec ProxySG must produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

The NSX-T Tier-1 Gateway Firewall must generate traffic log entries containing information to establish the details of the event.
1 rule found Severity: Low

The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.
1 rule found Severity: Medium

The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
2 rules found Severity: Medium

MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
2 rules found Severity: Medium

The DBMS must produce audit records containing sufficient information to establish the sources (origins) of the events.
3 rules found Severity: Medium

PostgreSQL must produce audit records containing sufficient information to establish the sources (origins) of the events.
3 rules found Severity: Medium

The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Arista router must be configured to produce audit records containing information to establish where the events occurred.
1 rule found Severity: Medium

A BIND 9.x server implementation must be configured to allow DNS administrators to audit all DNS server components, based on selectable event criteria, and produce audit records within all DNS server components that contain information for failed security verification tests, information to establish the outcome and source of the events, any information necessary to determine cause of failure, and any information necessary to return to operations with least disruption to mission processes.
1 rule found Severity: Low

The Cisco ASA must be configured to produce audit records containing information to establish the source of the event.
1 rule found Severity: Medium

The Cisco ASA must be configured to produce audit log records containing information to establish the source of events.
1 rule found Severity: Medium

The Cisco ASA remote access VPN server must be configured to generate log records containing information to establish the source of the events.
1 rule found Severity: Low

The Cisco switch must be configured to produce audit records containing information to establish the source of the events.
2 rules found Severity: Medium

The Cisco router must be configured to produce audit records containing information to establish the source of the events.
3 rules found Severity: Medium

The DNS server implementation must produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Endpoint must be configured to produce session (call detail) records containing the source of the connection.
1 rule found Severity: Medium

The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Session Manager must produce session (call) records containing the identity of the initiator of the call.
1 rule found Severity: Medium

The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
1 rule found Severity: Medium

The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
1 rule found Severity: Medium

SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
1 rule found Severity: Medium

AIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
1 rule found Severity: Medium

The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
1 rule found Severity: Low

The Juniper EX switch must be configured to produce audit log records containing information to establish the source of events.
1 rule found Severity: Medium

JBoss must be configured to record the IP address and port information used by management interface network traffic.
1 rule found Severity: Medium

The Juniper router must be configured to produce audit records containing information to establish the source of the events.
2 rules found Severity: Medium

Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
1 rule found Severity: Medium

MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
1 rule found Severity: Medium

An IIS 10.0 web server behind a load balancer or proxy server must produce log records containing the source client IP and destination information.
1 rule found Severity: Medium

An IIS 10.0 website behind a load balancer or proxy server must produce log records containing the source client IP, and destination information.
1 rule found Severity: Medium

The network device must produce audit log records containing information to establish the source of events.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
1 rule found Severity: High

Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
1 rule found Severity: Medium

The router must be configured to produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

The SDN controller must be configured to produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
1 rule found Severity: Medium

The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
1 rule found Severity: Medium

TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
1 rule found Severity: Medium

The web server must produce log records containing sufficient information to establish the source of events.
1 rule found Severity: Medium

A web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
1 rule found Severity: Medium

An Apache web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
2 rules found Severity: Medium

The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
2 rules found Severity: Medium

1 rule found Severity: Medium

The application server must produce log records containing sufficient information to establish the sources of the events.
1 rule found Severity: Medium

When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
1 rule found Severity: Medium

The Central Log Server must produce audit records containing information to establish the source of the events.
1 rule found Severity: Low

1 rule found Severity: Medium

The firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.
1 rule found Severity: Low

The operating system must produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

The HYCU virtual appliance must produce audit records containing information to establish when events occurred, where events occurred, the source of the event, the outcome of the event, and identity of any individual or process associated with the event.
1 rule found Severity: Medium

The IDPS must produce audit records containing information to establish the source of the event, including, at a minimum, originating source address.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

The Mainframe Product must produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
1 rule found Severity: Medium

1 rule found Severity: Low

Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
1 rule found Severity: Medium

The Palo Alto Networks security platform must produce audit records containing information to establish the source of the event, including, at a minimum, originating source address.
1 rule found Severity: Medium

The Palo Alto Networks security platform must produce audit log records containing information (FQDN, unique hostname, management IP address) to establish the source of events.
1 rule found Severity: Low

SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
2 rules found Severity: Medium

1 rule found Severity: Medium

The UEM server must be configured to produce audit records containing information to establish the source of the events.
1 rule found Severity: Medium

1 rule found Severity: Medium

VAMI must produce log records containing sufficient information to establish what type of events occurred.
1 rule found Severity: Medium

The NSX Distributed Firewall must generate traffic log entries that can be sent by the ESXi hosts to the central syslog.
1 rule found Severity: Low

1 rule found Severity: Medium

1 rule found Severity: Medium

The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The Security Token Service must record user access in a format that enables monitoring of remote access.
1 rule found Severity: Medium

The vCenter Lookup service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

1 rule found Severity: Medium

The VPN Gateway must generate log records containing information to establish the source of the events.
1 rule found Severity: Low

The vCenter PostgreSQL service must produce logs containing sufficient information to establish what type of events occurred.
2 rules found Severity: Medium

The vCenter STS service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter UI service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter VAMI service must produce log records containing sufficient information to establish what type of events occurred.
2 rules found Severity: Medium

The NSX-T Distributed Firewall must generate traffic log entries containing information to establish the details of the event.
1 rule found Severity: Medium
