CCI-000171
Allow organization-defined personnel or roles to select the event types that are to be logged by specific components of the system.
The A10 Networks ADC must allow only the ISSM (or individuals or roles appointed by the ISSM) Root, Read Write, or Read Only privileges.
1 rule found Severity: Medium

Citrix License Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

XenDesktop License Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The DBN-6300 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the audit log.
1 rule found Severity: Low

The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
1 rule found Severity: Medium

The DataPower Gateway must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

DB2 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.
1 rule found Severity: Medium

2 rules found Severity: Medium

The ISEC7 EMM Suite server must be configured to have at least one user in the following Administrator roles: Security Administrator, Site Administrator, Help Desk User.
1 rule found Severity: Medium

Where SQL Server Audit is in use at the database level, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the database level.
1 rule found Severity: Medium

Where SQL Server Trace is in use for auditing purposes, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be traced.
1 rule found Severity: Medium

Where SQL Server Audit is in use, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the server level.
1 rule found Severity: Medium

The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM.
1 rule found Severity: Medium

Nutanix AOS must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

Riverbed Optimization System (RiOS) must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be logged.
1 rule found Severity: Medium

Innoslate must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.
2 rules found Severity: Medium

The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.
2 rules found Severity: Medium

The Ubuntu operating system must permit only authorized groups to own the audit configuration files.
2 rules found Severity: Medium

MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
2 rules found Severity: Medium

The DBMS must allow designated organizational personnel to select which auditable events are to be audited by the database.
2 rules found Severity: Medium

PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
2 rules found Severity: Medium

PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.
1 rule found Severity: Medium

PostgreSQL must allow only the information system security manager (ISSM), or individuals or roles appointed by the ISSM, to select which events are to be audited.
1 rule found Severity: Medium

1 rule found Severity: Medium

The ISEC7 SPHERE server must be configured to have at least one user in the following Administrator roles: Security Administrator, Site Administrator, and Help Desk User.
1 rule found Severity: Medium

JBoss must be configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which loggable events are to be logged.
1 rule found Severity: Medium

MarkLogic Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
1 rule found Severity: Medium

Azure SQL Database must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The "Manage auditing and security log" user right must only be assigned to the Administrators group.
1 rule found Severity: Medium

2 rules found Severity: Medium

The MySQL Database Server 8.0 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

Redis Enterprise DBMS must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
1 rule found Severity: Medium

Splunk Enterprise must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to be assigned to the Power User role.
1 rule found Severity: Low

Splunk Enterprise must allow only the individuals appointed by the information system security manager (ISSM) to have full admin rights to the system.
1 rule found Severity: Low

TOSS must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which logable events are to be logged.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must be configured so that audit configuration files are not write-accessible by unauthorized users.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Central Log Server must be configured to allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be retained.
1 rule found Severity: Low

The container platform must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

AlmaLinux OS 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.
1 rule found Severity: Medium

AlmaLinux OS 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The DBMS must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The operating system must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The Mainframe Product must allow only the information system security manager (ISSM) or individuals or roles appointed by the ISSM to select which auditable events are to be audited.
1 rule found Severity: Medium

For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created.
1 rule found Severity: Medium

MariaDB must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

1 rule found Severity: Medium

SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.
1 rule found Severity: Medium

SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
2 rules found Severity: Medium

Windows Server 2019 Manage auditing and security log user right must only be assigned to the Administrators group.
1 rule found Severity: Medium

Windows Server 2022 manage auditing and security log user right must only be assigned to the Administrators group.
1 rule found Severity: Medium

OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
1 rule found Severity: Medium

OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

RHEL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.
1 rule found Severity: Medium

The VMM must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

The UEM server must be configured to allow only specific administrator roles to select which auditable events are to be audited.
1 rule found Severity: Medium

The ESXi host must produce audit records containing information to establish what type of events occurred.
1 rule found Severity: Medium

The ESXi must produce audit records containing information to establish what type of events occurred.
2 rules found Severity: Medium

The Photon operating system must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
1 rule found Severity: Medium

1 rule found Severity: Medium

The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter Lookup service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

The vCenter STS service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium
