Ensure the audit Subsystem is Installed
Ensure auditd Collects Information on Exporting to Media (successful)
Ensure auditd Collects System Administrator Actions
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Record Events that Modify the System's Discretionary Access Controls - umount
Record Events that Modify the System's Discretionary Access Controls - umount2
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Record attempts to alter time through adjtimex
Ensure the audit-libs package as a part of audit Subsystem is Installed
Record Attempts to Alter Time Through clock_settime
Record attempts to alter time through settimeofday
Record Attempts to Alter Time Through stime
Record Attempts to Alter the localtime File
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Any Attempts to Run chcon
Record Any Attempts to Run semanage
Record Any Attempts to Run setfiles
Record Any Attempts to Run setsebool
Record Attempts to Alter Logon and Logout Events - lastlog
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - insmod
Ensure auditd Collects Information on the Use of Privileged Commands - kmod
Ensure auditd Collects Information on the Use of Privileged Commands - modprobe
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - rmmod
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects System Administrator Actions - /etc/sudoers
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/
Record Any Attempts to Run chacl
Record Any Attempts to Run setfacl
Record Any Attempts to Run ssh-agent
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update
Ensure auditd Collects Information on the Use of Privileged Commands - usermod
Log USBGuard daemon audit events using Linux Audit
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Record Any Attempts to Run chmod
Record Any Attempts to Run rm
Record Attempts to Alter Logon and Logout Events - faillog
Ensure auditd Collects Information on the Use of Privileged Commands - chfn
Ensure auditd Collects Information on the Use of Privileged Commands - passmass
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
AAA Services must be configured to audit each authentication and authorization transaction.
The Akamai Luna Portal must provide audit record generation capability for DoD-defined auditable events within the network device.
The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
The application server must generate log records for access and authentication events.
The Arista network device must be configured to capture all DOD auditable events.
The application must provide audit record generation capability for the creation of session IDs.
The application must provide audit record generation capability for the destruction of session IDs.
The application must provide audit record generation capability for the renewal of session IDs.
The application must not write sensitive data into the application logs.
The application must provide audit record generation capability for session timeouts.
The application must record a time stamp indicating when the event occurred.
The application must provide audit record generation capability for HTTP headers including User-Agent, Referer, GET, and POST.
The application must provide audit record generation capability for connecting system IP addresses.
The application must record the username or user ID of the user associated with the event.
A BIND 9.x server implementation must be configured to allow DNS administrators to audit all DNS server components, based on selectable event criteria, and produce audit records within all DNS server components that contain information for failed security verification tests, information to establish the outcome and source of the events, any information necessary to determine cause of failure, and any information necessary to return to operations with least disruption to mission processes.
The BIND 9.x server logging configuration must be configured to generate audit records for all DoD-defined auditable events to a local file by enabling triggers for all events with a severity of info, notice, warning, error, and critical for all DNS components.
IDMS must use the ESM to generate auditable records for resources when DoD-defined auditable events occur.
IDMS must use the ESM to generate auditable records for commands and utilities when DoD-defined auditable events occur.
The Central Log Server must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.
The DBN-6300 must generate log events for detection events based on anomaly analysis.
The DBN-6300 must provide audit record generation capability for DoD-defined auditable events within the DBN-6300.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
The DNS server implementation must be configured to provide audit record generation capability for DoD-defined auditable events within all DNS server components.
The FortiGate device must generate log records for a locally developed list of auditable events.
Forescout must generate log records for a locally developed list of auditable events.
Google Android 12 must be configured to generate audit records for the following auditable events: detected integrity violations.
Google Android 13 must be configured to generate audit records for the following auditable events: Detected integrity violations.
The HP FlexFabric Switch must provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch.
The HYCU server must generate audit records for privileged activities or other system-level access.
The DataPower Gateway must provide audit record generation capability for DoD-defined auditable events within DataPower.
DB2 must provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
The MQ Appliance messaging server must generate log records for access and authentication events.
The WebSphere Liberty Server must log remote session and security activity.
The MaaS360 MDM server must be configured to enable all required audit events (if function is not automatically implemented during MDM/MAS server install): a. Failure to push a new application on a managed mobile device.
The MaaS360 server must be configured to enable all required audit events (if function is not automatically implemented during MDM/MAS server install): b. Failure to update an existing application on a managed mobile device.
The MaaS360 MDM Agent must be configured to implement the management setting: periodicity of reachability events equals six hours or less.
The ESCON Director Application Console Event log must be enabled.
The Hardware Management Console Event log must be active.
The WebSphere Application Server audit event type filters must be configured.
CA VM:Secure product must be installed and operating.
The IDPS must provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis.
The IDPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
The IDPS must provide audit record generation with a configurable severity and escalation level capability.
The JBoss server must generate log records for access and authentication events to the management interface.
The Juniper router must be configured to generate log records for a locally developed list of auditable events.
The Juniper Networks SRX Series Gateway IDPS must provide audit record generation capability for detecting events based on implementation of policy filters, rules, and signatures.
The Juniper Networks SRX Series Gateway IDPS must provide audit record generation with a configurable severity and escalation level capability.
The Juniper SRX Services Gateway must automatically terminate a network administrator session after organization-defined conditions or trigger events requiring session disconnect.
The Mainframe Product must provide audit record generation capability for DoD-defined auditable events within all application components.
Microsoft Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations.
Motorola Solutions Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations.
The Azure SQL Database must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.
Exchange Email Diagnostic log level must be set to lowest level.
Exchange must have Audit record parameters set.
The Exchange email Diagnostic log level must be set to the lowest level.
Exchange Connectivity logging must be enabled.
The Exchange Email Diagnostic log level must be set to the lowest level.
Exchange Audit record parameters must be set.
SQL Server must generate Trace or Audit records for organization-defined auditable events.
The Windows 2012 DNS Server log must be enabled.
The Windows 2012 DNS Server logging must be enabled to record events from all DNS server functions.
The network device must generate log records for a locally developed list of auditable events
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels).
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for system and account management actions.
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for file attribute management actions.
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for system module management actions.
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for directory and permissions management actions.
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for file management actions.
Nutanix AOS must provide audit record generation capability for DoD-defined auditable events for all account creations, modifications, disabling, and terminations.
Nutanix AOS must be configured to audit the loading and unloading of dynamic kernel modules.
OHS must have the client requests logging module loaded to generate log records for system startup and shutdown, system access, and system authentication logging.
OHS must have OraLogMode set to Oracle Diagnostic Logging text mode to generate log records for system startup and shutdown, system access, and system authentication logging.
OHS must have a log directory location defined to generate log records for system startup and shutdown, system access, and system authentication logging.
OHS must have a log level severity defined to generate adequate log records for system startup and shutdown, system access, and system authentication events.
OHS must have the log rotation parameter set to allow for the generation log records for system startup and shutdown, system access, and system authentication events.
OHS must have a log format defined to generate adequate logs by system startup and shutdown, system access, and system authentication events.
OHS must have a SSL log format defined to generate adequate logs by system startup and shutdown, system access, and system authentication events.
OHS must have a log file defined for each site/virtual host to capture logs generated by system startup and shutdown, system access, and system authentication events.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Riverbed Optimization System (RiOS) must provide audit record generation capability for DoD-defined auditable events within the network device.
Symantec ProxySG must enable event access logging.
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
The TPS must provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis.
The Tanium operating system (TanOS) must offload audit records onto a different system or media than the system being audited.
The UEM Agent must provide an alert via the trusted channel to the UEM Server in the event of any of the following audit events:
-successful application of policies to a mobile device
-receiving or generating periodic reachability events
-change in enrollment state
-failure to install an application from the UEM Server
-failure to update an application from the UEM Server.
The UEM Agent must generate a UEM Agent audit record of the following auditable events:-startup and shutdown of the UEM Agent-UEM policy updated-any modification commanded by the UEM Server.
The UEM Agent must be configured to enable the following function: read audit logs of the managed endpoint device.
The UEM server must provide audit record generation capability for DoD-defined auditable events within all application components.
The UEM server must be configured to provide audit records in a manner suitable for the Authorized Administrators to interpret the information.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.
The Horizon Connection Server must be configured with an events database.
AccessLogValve must be configured for each application context.
Tomcat servers behind a proxy or load balancer must log client IP.
The macOS system must enable System Integrity Protection.
The macOS system must enable System Integrity Protection.
The macOS system must ensure System Integrity Protection is enabled.
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
The Cisco ASA must be configured to log events based on policy access control rules, signatures, and anomaly analysis.
The Cisco ASA must be configured to send log records to the syslog server for specific facility and severity level.
PostgreSQL must be configured to provide audit record generation for DoD-defined auditable events within all DBMS/database components.
The Cisco ISE must generate log records for a locally developed list of auditable events.
The DBMS must provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
The container platform must generate audit records for all DoD-defined auditable events within all components in the platform.
The EDB Postgres Advanced Server must provide audit record generation capability for DOD-defined auditable events within all EDB Postgres Advanced Server/database components.
Extensions installation must be blocklisted by default.
Deletion of browser history must be disabled.
Prompt for download location must be enabled.
Download restrictions must be configured.
Chrome Cleanup must be disabled.
Chrome Cleanup reporting must be disabled.
Google Android 14 must be configured to generate audit records for the following auditable events: Detected integrity violations.
The operating system must provide audit record generation capability for DoD-defined auditable events for all operating system components.
SSMC must provide audit record generation capability for DOD-defined auditable events for all operating system components.
SSMC web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
AIX must provide audit record generation functionality for DoD-defined auditable events.
The Juniper EX switch must be configured to generate log records for a locally developed list of auditable events.
MarkLogic Server must be configured to provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
MariaDB must provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
Exchange connectivity logging must be enabled.
The Exchange email diagnostic log level must be set to the lowest level.
Exchange audit record parameters must be set.
Configuring History setting must be set to 40 days.
Browser must retain history on exit.
Deleting websites that the user has visited must be disallowed.
SQL Server must be configured to generate audit records for DoD-defined auditable events within all DBMS/database components.
Audit policy using subcategories must be enabled.
Windows Server 2019 must force audit policy subcategory settings to override audit policy category settings.
Windows Server 2022 must force audit policy subcategory settings to override audit policy category settings.
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The DBMS must provide audit record generation capability for organization-defined auditable events within the database.
PostgreSQL must provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OL 8 must generate audit records for any use of the "su" command.
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
OL 8 must generate audit records for any use of the "chage" command.
OL 8 must generate audit records for any uses of the "chcon" command.
OL 8 must generate audit records for any use of the "ssh-agent" command.
OL 8 must generate audit records for any use of the "passwd" command.
OL 8 must generate audit records for any use of the "mount" command.
OL 8 must generate audit records for any use of the "umount" command.
OL 8 must generate audit records for any use of the "mount" syscall.
OL 8 must generate audit records for any use of the "unix_update" command.
OL 8 must generate audit records for any use of the "postdrop" command.
OL 8 must generate audit records for any use of the "postqueue" command.
OL 8 must generate audit records for any use of the "semanage" command.
OL 8 must generate audit records for any use of the "setfiles" command.
OL 8 must generate audit records for any use of the "userhelper" command.
OL 8 must generate audit records for any use of the "setsebool" command.
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
OL 8 must generate audit records for any use of the "ssh-keysign" command.
OL 8 must generate audit records for any use of the "setfacl" command.
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
OL 8 must generate audit records for any use of the "newgrp" command.
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
OL 8 must generate audit records for any use of the "gpasswd" command.
OL 8 must generate audit records for any use of the delete_module syscall.
OL 8 must generate audit records for any use of the "crontab" command.
OL 8 must generate audit records for any use of the "chsh" command.
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
OL 8 must generate audit records for any use of the "sudo" command.
OL 8 must generate audit records for any use of the "usermod" command.
OL 8 must generate audit records for any use of the "chacl" command.
OL 8 must generate audit records for any use of the "kmod" command.
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
OL 8 must enable auditing of processes that start prior to the audit daemon.
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
The MySQL Database Server 8.0 must be configured to provide audit record generation capability for DoD-defined auditable events within all database components.
Redis Enterprise DBMS must provide audit record generation capability for DoD-defined auditable events within all DBMS/database components.
Redis Enterprise DBMS must generate audit records for DoD-defined auditable events within all DBMS/database components.
OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/.
The RHEL 8 audit package must be installed.
Successful/unsuccessful uses of the su command in RHEL 8 must generate an audit record.
The RHEL 8 audit system must be configured to audit any usage of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
Successful/unsuccessful uses of the chage command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the chcon command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the passwd command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the mount command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the umount command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the mount syscall in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the unix_update in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of postdrop in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of postqueue in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of semanage in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of setfiles in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of userhelper in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of setsebool in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of unix_chkpwd in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the pam_timestamp_check command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the newgrp command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the init_module and finit_module system calls in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the rename, unlink, rmdir, renameat, and unlinkat system calls in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the gpasswd command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the delete_module command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the crontab command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the chsh command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the sudo command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the usermod command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the chacl command in RHEL 8 must generate an audit record.
Successful/unsuccessful uses of the kmod command in RHEL 8 must generate an audit record.
Successful/unsuccessful modifications to the faillock log file in RHEL 8 must generate an audit record.
Successful/unsuccessful modifications to the lastlog file in RHEL 8 must generate an audit record.
RHEL 8 must enable auditing of processes that start prior to the audit daemon.
RHEL 8 must enable Linux audit logging for the USBGuard daemon.
RHEL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
The SUSE operating system must generate audit records for all uses of the su command.
The SUSE operating system must generate audit records for all uses of the sudo command.
The SUSE operating system must generate audit records for all uses of the chfn command.
The SUSE operating system must generate audit records for all uses of the mount command.
The SUSE operating system must generate audit records for all uses of the umount command.
The SUSE operating system must generate audit records for all uses of the ssh-agent command.
The SUSE operating system must generate audit records for all uses of the ssh-keysign command.
The SUSE operating system must generate audit records for all uses of the kmod command.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the gpasswd command.
The SUSE operating system must generate audit records for all uses of the newgrp command.
The SUSE operating system must generate audit records for a uses of the chsh command.
The SUSE operating system must generate audit records for all uses of the chmod command.
The SUSE operating system must generate audit records for all uses of the setfacl command.
The SUSE operating system must generate audit records for all uses of the chacl command.
Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
The SUSE operating system must generate audit records for all uses of the rm command.
The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
The SUSE operating system must generate audit records for all modifications to the lastlog file.
The SUSE operating system must generate audit records for all uses of the passmass command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd command.
The SUSE operating system must generate audit records for all uses of the chage command.
The SUSE operating system must generate audit records for all uses of the usermod command.
The SUSE operating system must generate audit records for all uses of the crontab command.
The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
The SUSE operating system must generate audit records for all uses of the delete_module command.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
The SUSE operating system must generate audit records for all modifications to the faillog file.
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
RHEL 9 must enable Linux audit logging for the USBGuard daemon.
RHEL 9 audit package must be installed.
RHEL 9 audit service must be enabled.
RHEL 9 audit system must audit local events.
RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL 9 must audit all uses of umount system calls.
RHEL 9 must audit all uses of the chacl command.
RHEL 9 must audit all uses of the setfacl command.
RHEL 9 must audit all uses of the chcon command.
RHEL 9 must audit all uses of the semanage command.
RHEL 9 must audit all uses of the setfiles command.
RHEL 9 must audit all uses of the setsebool command.
RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL 9 must audit all uses of the delete_module system call.
RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL 9 must audit all uses of the chage command.
RHEL 9 must audit all uses of the chsh command.
RHEL 9 must audit all uses of the crontab command.
RHEL 9 must audit all uses of the gpasswd command.
RHEL 9 must audit all uses of the kmod command.
RHEL 9 must audit all uses of the newgrp command.
RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL 9 must audit all uses of the passwd command.
RHEL 9 must audit all uses of the postdrop command.
RHEL 9 must audit all uses of the postqueue command.
RHEL 9 must audit all uses of the ssh-agent command.
RHEL 9 must audit all uses of the ssh-keysign command.
RHEL 9 must audit all uses of the su command.
RHEL 9 must audit all uses of the sudo command.
RHEL 9 must audit all uses of the sudoedit command.
RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL 9 must audit all uses of the unix_update command.
RHEL 9 must audit all uses of the userhelper command.
RHEL 9 must audit all uses of the usermod command.
RHEL 9 must audit all uses of the mount command.
Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd or unix2_chkpwd commands.
The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.
The SUSE operating system must generate audit records for all uses of the sudoedit command.
The SUSE operating system must generate audit records for all uses of the mount system call.
The SUSE operating system must generate audit records for all uses of the umount system call.
The SUSE operating system must generate audit records for all uses of the insmod command.
The SUSE operating system must generate audit records for all uses of the rmmod command.
The SUSE operating system must generate audit records for all uses of the modprobe command.
The SUSE operating system must generate audit records for all uses of the chcon command.
The SUSE operating system must generate audit records for all uses of the delete_module system call.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
The audit records must provide data for all auditable events defined at the organizational level for the organization-defined information system components.
The operating system must support the capability to compile audit records from multiple components within the system into a system-wide (logical or physical) audit trail that is time-correlated to within organization-defined level of tolerance.
The audit system must be configured to audit all discretionary access control permission modifications.
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
Splunk Enterprise must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.
The VMM must provide audit record generation capability for DoD-defined auditable events for all VMM components.
VAMI must generate log records for system startup and shutdown.
Performance Charts must record user access in a format that enables monitoring of remote access.
Performance Charts must generate log records for system startup and shutdown.
ESX Agent Manager must record user access in a format that enables monitoring of remote access.
ESX Agent Manager must generate log records for system startup and shutdown.
Lookup Service must generate log records for system startup and shutdown.
The Photon operating system must have the auditd service running.
The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
VMware Postgres log files must contain required fields.
The Security Token Service must generate log records during Java startup and shutdown.
The vCenter Lookup service must produce log records containing sufficient information regarding event details.
vSphere UI must record user access in a format that enables monitoring of remote access.
vSphere UI must generate log records for system startup and shutdown.
The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
The Photon operating system must enable the auditd service.
The vCenter PostgreSQL service must enable "pgaudit" to provide audit record generation capabilities.
The vCenter STS service must produce log records containing sufficient information regarding event details.
The vCenter UI service must produce log records containing sufficient information regarding event details.
The web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
Zebra Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations.
The Windows DNS Server log must be enabled.
The EDB Postgres Advanced Server must be configured to provide audit record generation capability for DoD-defined auditable events within all EDB Postgres Advanced Server/database components.
Ubuntu 22.04 LTS must have the "auditd" package installed.
Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
PostgreSQL must provide audit record generation capability for DOD-defined auditable events within all DBMS/database components.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to provide session (call detail) record generation capability.
The Enterprise Voice, Video, and Messaging Session Manager must produce session (call) records for events determined to be significant and relevant by local policy.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
Google Android 15 must be configured to generate audit records for the following auditable events: Detected integrity violations.
Audit logging must be enabled on MKE.
MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
The OL 8 audit package must be installed.
SLEM 5 must generate audit records for all uses of the "chacl" command.
SLEM 5 must generate audit records for all uses of the "chage" command.
SLEM 5 must generate audit records for all uses of the "chcon" command.
SLEM 5 must generate audit records for all uses of the "chfn" command.
SLEM 5 must generate audit records for all uses of the "chmod" command.
SLEM 5 must generate audit records for a uses of the "chsh" command.
SLEM 5 must generate audit records for all uses of the "crontab" command.
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
SLEM 5 must generate audit records for all uses of the "insmod" command.
SLEM 5 must generate audit records for all uses of the "kmod" command.
SLEM 5 must generate audit records for all uses of the "modprobe" command.
SLEM 5 must generate audit records for all uses of the "newgrp" command.
SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
SLEM 5 must generate audit records for all uses of the "passwd" command.
SLEM 5 must generate audit records for all uses of the "rm" command.
SLEM 5 must generate audit records for all uses of the "rmmod" command.
SLEM 5 must generate audit records for all uses of the "setfacl" command.
SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
SLEM 5 must generate audit records for all uses of the "su" command.
SLEM 5 must generate audit records for all uses of the "sudo" command.
SLEM 5 must generate audit records for all uses of the "sudoedit" command.
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
SLEM 5 must generate audit records for all uses of the "usermod" command.
SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
SLEM 5 must generate audit records for all uses of the "delete_module" system call.
SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
SLEM 5 must generate audit records for all uses of the "mount" system call.
SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
SLEM 5 must generate audit records for all uses of the "umount" system call.
SLEM 5 must generate audit records for all modifications to the "lastlog" file.
SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
Successful/unsuccessful uses of "setfiles" in SLEM 5 must generate an audit record.
Successful/unsuccessful uses of "semanage" in SLEM 5 must generate an audit record.
Successful/unsuccessful uses of "setsebool" in SLEM 5 must generate an audit record.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record.
Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of postdrop in TOSS must generate an audit record.
Successful/unsuccessful uses of postqueue in TOSS must generate an audit record.
Successful/unsuccessful uses of setsebool in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record.
Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record.
Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record.
Successful/unsuccessful uses of setfiles in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record.
The NSX Manager must configure logging levels for services to ensure audit records are generated.