Ensure All Accounts on the System Have Unique User IDs
Ensure the audit Subsystem is Installed
Ensure auditd Collects Information on Exporting to Media (successful)
Ensure auditd Collects System Administrator Actions
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Ensure the audit-libs package as a part of audit Subsystem is Installed
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Any Attempts to Run chcon
Record Any Attempts to Run setsebool
Record Attempts to Alter Logon and Logout Events - lastlog
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - kmod
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - pt_chown
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects System Administrator Actions - /etc/sudoers
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/
Record Any Attempts to Run chacl
Record Any Attempts to Run setfacl
Record Any Attempts to Run ssh-agent
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update
Ensure auditd Collects Information on the Use of Privileged Commands - usermod
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
The A10 Networks ADC must have command auditing enabled.
The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands.
The application server must generate log records containing the full-text recording of privileged commands or the individual identities of group account users.
The Arista network device must be configured to audit all administrator activity.
The application must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
The application must implement transaction recovery logs when transaction based.
The DBN-6300 must generate audit records containing the full-text recording of privileged commands.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
The FortiGate device must generate audit records containing the full-text recording of privileged commands.
The HP FlexFabric Switch must generate audit records containing the full-text recording of privileged commands.
The HYCU Server must generate audit records containing the full-text recording of privileged commands.
DB2 must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
The MQ Appliance messaging server must produce log records containing information to establish what type of events occurred.
The WebSphere Liberty Server must log remote session and security activity.
The WebSphere Application Server audit event type filters must be configured.
CA VM:Secure product must be installed and operating.
The Juniper router must be configured to generate audit records containing the full-text recording of privileged commands.
The Juniper SRX Services Gateway must generate log records containing the full-text recording of privileged commands.
The Mainframe Product must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
Azure SQL Database must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
SQL Server must include organization-defined additional, more detailed information in Trace or Audit records for events identified by type, location, or subject.
The network device must generate audit records containing the full-text recording of privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the passwd/gpasswd/unix-chkpwd privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the chage privileged command.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the userhelper privileged command.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the mount and umount privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the post-related privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the opensshrelated privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful attempts to execute the crontab-related privileged commands.
Nutanix AOS must produce audit records containing the individual identities of group account users.
The configuration integrity of the container platform must be ensured and runtime policies must be configured.
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
Riverbed Optimization System (RiOS) must generate audit records containing the full-text recording of privileged commands.
The UEM server must be configured to generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
AccessLogValve must be configured per each virtual host.
The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.
The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
The macOS system must enable security auditing.
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
PostgreSQL must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
The Cisco ASA must be configured to generate audit records containing the full-text recording of privileged commands.
The Cisco router must be configured to generate audit records containing the full-text recording of privileged commands.
The Cisco switch must be configured to generate audit records containing the full-text recording of privileged commands.
The DBMS must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
The Cisco ISE must generate audit records containing the full-text recording of privileged commands.
The container platform must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
The EDB Postgres Advanced Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
The operating system must generate audit records containing the full-text recording of privileged commands.
The operating system must produce audit records containing the individual identities of group account users.
The HPE 3PAR OS must be configured for centralized account management functions via LDAP.
The HPE 3PAR OS must provide automated mechanisms for supporting account management functions via AD.
AIX must produce audit records containing the full-text recording of privileged commands.
IBM z/OS Required SMF data record types must be collected.
IBM z/OS must specify SMF data options to assure appropriate activation.
IBM RACF SETROPTS LOGOPTIONS must be properly configured.
IBM z/OS required SMF data record types must be collected.
IBM z/OS must specify SMF data options to ensure appropriate activation.
Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
MariaDB must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
SQL Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
Command line data must be included in process creation events.
PowerShell script block logging must be enabled on Windows 10.
PowerShell script block logging must be enabled on Windows 11.
PowerShell script block logging must be enabled.
Windows Server 2019 command line data must be included in process creation events.
Windows Server 2019 PowerShell script block logging must be enabled.
Windows Server 2022 command line data must be included in process creation events.
Windows Server 2022 PowerShell script block logging must be enabled.
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The DBMS must include organization-defined additional, more detailed information in the audit records for audit events identified by type, location, or subject.
The Oracle Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.
The Oracle Linux operating system must audit all uses of the passwd command.
The Oracle Linux operating system must audit all uses of the unix_chkpwd command.
The Oracle Linux operating system must audit all uses of the gpasswd command.
The Oracle Linux operating system must audit all uses of the chage command.
The Oracle Linux operating system must audit all uses of the userhelper command.
The Oracle Linux operating system must audit all uses of the mount command and syscall.
The Oracle Linux operating system must audit all uses of the umount command.
The Oracle Linux operating system must audit all uses of the postdrop command.
The Oracle Linux operating system must audit all uses of the postqueue command.
The Oracle Linux operating system must audit all uses of the ssh-keysign command.
The Oracle Linux operating system must audit all uses of the crontab command.
OL 8 duplicate User IDs (UIDs) must not exist for interactive users.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OL 8 must generate audit records for any use of the "su" command.
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
OL 8 must generate audit records for any use of the "chage" command.
OL 8 must generate audit records for any uses of the "chcon" command.
OL 8 must generate audit records for any use of the "ssh-agent" command.
OL 8 must generate audit records for any use of the "passwd" command.
OL 8 must generate audit records for any use of the "mount" command.
OL 8 must generate audit records for any use of the "umount" command.
OL 8 must generate audit records for any use of the "mount" syscall.
OL 8 must generate audit records for any use of the "unix_update" command.
OL 8 must generate audit records for any use of the "postdrop" command.
OL 8 must generate audit records for any use of the "postqueue" command.
OL 8 must generate audit records for any use of the "setsebool" command.
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
OL 8 must generate audit records for any use of the "ssh-keysign" command.
OL 8 must generate audit records for any use of the "setfacl" command.
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
OL 8 must generate audit records for any use of the "newgrp" command.
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
OL 8 must generate audit records for any use of the "gpasswd" command.
OL 8 must generate audit records for any use of the delete_module syscall.
OL 8 must generate audit records for any use of the "crontab" command.
OL 8 must generate audit records for any use of the "chsh" command.
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
OL 8 must generate audit records for any use of the "sudo" command.
OL 8 must generate audit records for any use of the "usermod" command.
OL 8 must generate audit records for any use of the "chacl" command.
OL 8 must generate audit records for any use of the "kmod" command.
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
OL 8 must enable auditing of processes that start prior to the audit daemon.
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
The MySQL Database Server 8.0 must include additional, more detailed, organizationally defined information in the audit records for audit events identified by type, location, or subject.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
The Red Hat Enterprise Linux operating system must audit all uses of the passwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the unix_chkpwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the gpasswd command.
The Red Hat Enterprise Linux operating system must audit all uses of the chage command.
The Red Hat Enterprise Linux operating system must audit all uses of the userhelper command.
The Red Hat Enterprise Linux operating system must audit all uses of the su command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudo command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.
The Red Hat Enterprise Linux operating system must audit all uses of the chsh command.
The Red Hat Enterprise Linux operating system must audit all uses of the mount command and syscall.
The Red Hat Enterprise Linux operating system must audit all uses of the umount command.
The Red Hat Enterprise Linux operating system must audit all uses of the postdrop command.
The Red Hat Enterprise Linux operating system must audit all uses of the postqueue command.
The Red Hat Enterprise Linux operating system must audit all uses of the ssh-keysign command.
The Red Hat Enterprise Linux operating system must audit all uses of the crontab command.
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users.
RHEL 9 audit package must be installed.
RHEL 9 audit service must be enabled.
RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL 9 must audit all uses of the chacl command.
RHEL 9 must audit all uses of the setfacl command.
RHEL 9 must audit all uses of the chcon command.
RHEL 9 must audit all uses of the semanage command.
RHEL 9 must audit all uses of the setfiles command.
RHEL 9 must audit all uses of the setsebool command.
RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL 9 must audit all uses of the delete_module system call.
RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL 9 must audit all uses of the chage command.
RHEL 9 must audit all uses of the chsh command.
RHEL 9 must audit all uses of the crontab command.
RHEL 9 must audit all uses of the gpasswd command.
RHEL 9 must audit all uses of the kmod command.
RHEL 9 must audit all uses of the newgrp command.
RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL 9 must audit all uses of the passwd command.
RHEL 9 must audit all uses of the postdrop command.
RHEL 9 must audit all uses of the postqueue command.
RHEL 9 must audit all uses of the ssh-agent command.
RHEL 9 must audit all uses of the ssh-keysign command.
RHEL 9 must audit all uses of the su command.
RHEL 9 must audit all uses of the sudo command.
RHEL 9 must audit all uses of the sudoedit command.
RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL 9 must audit all uses of the unix_update command.
RHEL 9 must audit all uses of the userhelper command.
RHEL 9 must audit all uses of the usermod command.
RHEL 9 must audit all uses of the mount command.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
The VMM must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
The Photon operating system must be configured to audit the execution of privileged functions.
The Photon operating system must have the auditd service running.
VMware Postgres log files must contain required fields.
The Photon operating system must enable the auditd service.
The vCenter PostgreSQL service must produce logs containing sufficient information to establish what type of events occurred.
Ubuntu 22.04 LTS must have the "auditd" package installed.
Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
Audit logging must be enabled on MKE.
MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
The OL 8 audit package must be installed.
SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
SLEM 5 must generate audit records for all uses of the "chage" command.
SLEM 5 must generate audit records for a uses of the "chsh" command.
SLEM 5 must generate audit records for all uses of the "crontab" command.
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
SLEM 5 must generate audit records for all uses of the "newgrp" command.
SLEM 5 must generate audit records for all uses of the "passwd" command.
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
SLEM 5 must generate audit records for all uses of the "su" command.
SLEM 5 must generate audit records for all uses of the "sudo" command.
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
TOSS must generate audit records containing the full-text recording of privileged commands.
Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record.
Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of postdrop in TOSS must generate an audit record.
Successful/unsuccessful uses of postqueue in TOSS must generate an audit record.
Successful/unsuccessful uses of setsebool in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record.
Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record.
Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record.
Successful/unsuccessful uses of setfiles in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record.