Ensure the audit Subsystem is Installed
Ensure auditd Collects Information on Exporting to Media (successful)
Ensure auditd Collects System Administrator Actions
Record Events that Modify User/Group Information
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Record Events that Modify the System's Discretionary Access Controls - umount
Record Events that Modify the System's Discretionary Access Controls - umount2
Ensure auditd Collects File Deletion Events by User
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Loading and Unloading
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Ensure auditd Collects Information on the Use of Privileged Commands - init
Ensure auditd Collects Information on the Use of Privileged Commands - poweroff
Ensure auditd Collects Information on the Use of Privileged Commands - reboot
Ensure auditd Collects Information on the Use of Privileged Commands - shutdown
Ensure the audit-libs package as a part of audit Subsystem is Installed
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Any Attempts to Run chcon
Record Any Attempts to Run restorecon
Record Any Attempts to Run semanage
Record Any Attempts to Run setfiles
Record Any Attempts to Run setsebool
Record Any Attempts to Run seunshare
Record Unsuccessful Permission Changes to Files - chmod
Record Unsuccessful Ownership Changes to Files - chown
Record Unsuccessful Permission Changes to Files - fchmod
Record Unsuccessful Permission Changes to Files - fchmodat
Record Unsuccessful Ownership Changes to Files - fchown
Record Unsuccessful Ownership Changes to Files - fchownat
Record Unsuccessful Permission Changes to Files - fremovexattr
Record Unsuccessful Permission Changes to Files - fsetxattr
Record Unsuccessful Ownership Changes to Files - lchown
Record Unsuccessful Permission Changes to Files - lremovexattr
Record Unsuccessful Permission Changes to Files - lsetxattr
Record Unsuccessful Creation Attempts to Files - open_by_handle_at O_CREAT
Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE
Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - open O_CREAT
Record Unsuccessful Modification Attempts to Files - open O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To open Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - openat O_CREAT
Record Unsuccessful Modification Attempts to Files - openat O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To openat Are Ordered Correctly
Record Unsuccessful Permission Changes to Files - removexattr
Record Unsuccessful Delete Attempts to Files - rename
Record Unsuccessful Delete Attempts to Files - renameat
Record Unsuccessful Permission Changes to Files - setxattr
Record Unsuccessful Delete Attempts to Files - unlink
Record Unsuccessful Delete Attempts to Files - unlinkat
Ensure auditd Collects Information on Kernel Module Unloading - create_module
Record Attempts to Alter Logon and Logout Events
Record Attempts to Alter Logon and Logout Events - faillock
Record Attempts to Alter Logon and Logout Events - lastlog
Record Attempts to Alter Logon and Logout Events - tallylog
Ensure auditd Collects Information on the Use of Privileged Commands - at
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - insmod
Ensure auditd Collects Information on the Use of Privileged Commands - kmod
Ensure auditd Collects Information on the Use of Privileged Commands - modprobe
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgidmap
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - newuidmap
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - pt_chown
Ensure auditd Collects Information on the Use of Privileged Commands - rmmod
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects Information on the Use of Privileged Commands - usernetctl
Ensure auditd Collects System Administrator Actions - /etc/sudoers
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/
Record Attempts to perform maintenance activities
Record Any Attempts to Run chacl
Record Any Attempts to Run setfacl
Record Any Attempts to Run ssh-agent
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update
Ensure auditd Collects Information on the Use of Privileged Commands - usermod
Log USBGuard daemon audit events using Linux Audit
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Record Any Attempts to Run chmod
Record Any Attempts to Run rm
Record Attempts to Alter Logon and Logout Events - faillog
Ensure auditd Collects Information on the Use of Privileged Commands - chfn
Ensure auditd Collects Information on the Use of Privileged Commands - passmass
Record Attempts to Alter Process and Session Initiation Information btmp
Record Attempts to Alter Process and Session Initiation Information utmp
Record Attempts to Alter Process and Session Initiation Information wtmp
Record Unsuccessful Delete Attempts to Files - renameat2
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
Record Any Attempts to Run apparmor_parser
Ensure auditd Collects Information on the Use of Privileged Commands - fdisk
Compliance Guardian must provide automated mechanisms for supporting account management functions.
The Akamai Luna Portal must generate audit records when successful/unsuccessful attempts to access privileges occur.
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access privileges occur.
The ALG must generate audit records when successful/unsuccessful attempts to access security objects occur.
The ALG that is part of a CDS must generate audit records when successful/unsuccessful attempts to access security levels occur.
The ALG must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The ALG must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The ALG must generate audit records when successful/unsuccessful attempts to modify security levels occur.
The ALG must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The ALG must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
The Arista Multilayer Switch must generate audit records for privileged activities or other system-level access.
The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system.
The Arista Multilayer Switch must generate audit records when concurrent logons from different workstations occur.
The Arista Multilayer Switch must generate audit records for all account creations, modifications, disabling, and termination events.
The ALG must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The ALG must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
The ALG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
The application server must generate log records when successful/unsuccessful attempts to modify privileges occur.
The application server must generate log records when successful/unsuccessful attempts to delete privileges occur.
The application server must generate log records when successful/unsuccessful logon attempts occur.
The application server must generate log records for privileged activities.
The application must generate log records showing starting and ending times for user access to the application server management interface.
The application server must generate log records when concurrent logons from different workstations occur to the application server management interface.
The application server must generate log records for all account creations, modifications, disabling, and termination events.
The Arista network device must be configured to audit all administrator activity.
The Arista network device must be configured to capture all DOD auditable events.
The application must generate audit records when successful/unsuccessful attempts to grant privileges occur.
The application must generate audit records when successful/unsuccessful attempts to access security objects occur.
The application must generate audit records when successful/unsuccessful attempts to access security levels occur.
The application must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The application must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The application must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The application must generate audit records when successful/unsuccessful attempts to modify security levels occur.
The application must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
The application must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The application must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The application must generate audit records when successful/unsuccessful attempts to delete application database security objects occur.
The application must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
The application must generate audit records when successful/unsuccessful logon attempts occur.
The application must generate audit records for privileged activities or other system-level access.
The application must generate audit records showing starting and ending time for user access to the system.
The application must generate audit records when successful/unsuccessful accesses to objects occur.
The application must generate audit records for all direct access to the information system.
The application must generate audit records for all account creations, modifications, disabling, and termination events.
The application must generate audit records when concurrent logons from different workstations occur.
In the event of an error when validating the binding of other DNS servers identity to the BIND 9.x information, when anomalies in the operation of the signed zone transfers are discovered, for the success and failure of start and stop of the name server service or daemon, and for the success and failure of all name server events, a BIND 9.x server implementation must generate a log entry.
The CA API Gateway must generate audit records when successful/unsuccessful logon attempts occur.
The CA API Gateway must generate audit records showing starting and ending time for administrator access to the system.
The CA API Gateway must generate audit records when concurrent logons from different workstations occur.
The CA API Gateway providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
The CA API Gateway providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
The DBN-6300 must generate log records when successful attempts to access privileges occur.
The DBN-6300 must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
The DBN-6300 must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The DBN-6300 must generate audit records when successful/unsuccessful logon attempts occur.
The DBN-6300 must generate audit records for privileged activities or other system-level access.
The DBN-6300 must generate audit records showing starting and ending time for administrator access to the system.
The DBN-6300 must generate audit records when concurrent logons from different workstations occur.
The DBN-6300 must generate audit records for all account creation, modification, disabling, and termination events.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
The DNS implementation must generate audit records for the success and failure of start and stop of the name server service or daemon.
The DNS implementation must generate audit records for the success and failure of all name server events.
The firewall must generate traffic log records when traffic is denied, restricted, or discarded.
The firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
The FortiGate device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The FortiGate device must generate audit records when successful/unsuccessful logon attempts occur.
The FortiGate device must generate audit records for privileged activities or other system-level access.
The FortiGate device must generate audit records showing starting and ending time for administrator access to the system.
The FortiGate device must generate audit records when concurrent logons from different workstations occur.
The FortiGate firewall must generate traffic log records when traffic is denied, restricted, or discarded.
The FortiGate firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
Forescout must generate log records when successful attempts to access privileges occur.
Forescout must generate log records when attempts to modify administrator privileges occur.
Forescout must generate log records when attempts to delete administrator privileges occur.
Forescout must generate log records showing when successful logon attempts occur.
Forescout must generate log records for privileged activities or other system-level access.
Forescout must generate log records showing starting and ending time for administrator access to the system.
Forescout must generate log records when concurrent logons from different workstations occur.
Forescout must generate a log record when the client machine fails policy assessment because required security software is missing or has been deleted. This is required for compliance with C2C Step 1.
The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The HP FlexFabric Switch must generate audit records when successful/unsuccessful logon attempts occur.
The HP FlexFabric Switch must generate audit records for privileged activities or other system-level access.
The HP FlexFabric Switch must generate audit records showing starting and ending time for administrator access to the system.
The HP FlexFabric Switch must generate audit records when concurrent logons from different workstations occur.
The HP FlexFabric Switch must generate audit records for all account creations, modifications, disabling, and termination events.
The HYCU server must generate audit records when successful/unsuccessful attempts to access privileges occur.
The HYCU server must generate audit records when successful/unsuccessful attempts to modify or delete administrator privileges occur.
The HYCU server must generate audit records when successful/unsuccessful logon attempts occur.
The HYCU server must generate audit records for privileged activities or other system-level access.
The HYCU server must initiate session auditing upon startup and produce audit log records containing sufficient information to establish what type of event occurred.
DB2 must generate audit records when privileges/permissions are retrieved.
DB2 must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
The MQ Appliance messaging server must identify potentially security-relevant error conditions.
The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
The WebSphere Liberty Server must log remote session and security activity.
DB2 must generate audit records when security objects are accessed.
DB2 must generate audit records when unsuccessful attempts to access security objects occur.
DB2 must generate audit records when categorized information (e.g., classification levels/security levels) are accessed.
DB2 must generate audit records when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
DB2 must generate audit records when privileges/permissions are added.
DB2 must generate audit records when unsuccessful attempts to add privileges/permissions occur.
DB2 must generate audit records when privileges/permissions are modified.
DB2 must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
DB2 must generate audit records when security objects are modified.
DB2 must generate audit records when unsuccessful attempts to modify security objects occur.
DB2 must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
DB2 must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
DB2 must generate audit records when privileges/permissions are deleted.
DB2 must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
DB2 must generate audit records when security objects are deleted.
DB2 must generate audit records when unsuccessful attempts to delete security objects occur.
DB2 must generate audit records when categorized information (e.g., classification levels/security levels) is deleted.
DB2 must generate audit records when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
DB2 must generate audit records when successful logons or connections occur.
DB2 must generate audit records when unsuccessful logons or connection attempts occur.
DB2 must generate audit records for all privileged activities or other system-level access.
DB2 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
DB2 must generate audit records showing starting and ending time for user access to the database(s).
DB2 must generate audit records when concurrent logons/connections by the same user from different workstations occur.
DB2 must generate audit records when successful accesses to objects occur.
DB2 must generate audit records when unsuccessful accesses to objects occur.
DB2 must generate audit records for all direct access to the database(s).
The WebSphere Liberty Server must generate log records for authentication and authorization events.
The WebSphere Application Server audit event type filters must be configured.
The WebSphere Application Server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
The MQ Appliance network device must generate audit records when concurrent logons from different workstations occur.
The MQ Appliance network device must generate audit records for all account creations, modifications, disabling, and termination events.
CA VM:Secure product must be installed and operating.
The IBM z/VM Journal option must be specified in the Product Configuration File.
JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.
JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.
JBoss must be configured to generate log records when successful/unsuccessful logon attempts occur.
JBoss must be configured to generate log records for privileged activities.
JBoss must be configured to generate log records that show starting and ending times for access to the application server management interface.
JBoss must be configured to generate log records when concurrent logons from different workstations occur to the application server management interface.
JBoss must be configured to generate log records for all account creations, modifications, disabling, and termination events.
The Juniper router must be configured to generate audit records when successful/unsuccessful attempts to logon with access privileges occur.
The Juniper router must be configured to generate log records when administrator privileges are modified.
The Juniper router must be configured to generate log records when administrator privileges are deleted.
The Juniper router must be configured to generate audit records when successful/unsuccessful logon attempts occur.
The Juniper router must be configured to generate log records for privileged activities.
The Juniper router must be configured to generate log records when concurrent logons from different workstations occur.
The Juniper SRX Services Gateway must generate log records when firewall filters, security screens and security policies are invoked and the traffic is denied or restricted.
The Juniper SRX Services Gateway Firewall must generate audit records when unsuccessful attempts to access security zones occur.
The Juniper SRX Services Gateway must generate log records when successful attempts to configure the device and use commands occur.
The Juniper SRX Services Gateway must generate log records when changes are made to administrator privileges.
The Juniper SRX Services Gateway must generate log records when administrator privileges are deleted.
The Juniper SRX Services Gateway must generate log records when logon events occur.
The Juniper SRX Services Gateway must generate log records when privileged commands are executed.
The Juniper SRX Services Gateway must generate log records when concurrent logons from different workstations occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to access privileges occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security objects occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security levels occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security levels occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
The Mainframe Product must generate audit records when successful/unsuccessful logon attempts occur.
The Mainframe Product must generate audit records for privileged activities or other system-level access.
The Mainframe Product must generate audit records showing starting and ending time for user access to the system.
The Mainframe Product must generate audit records when concurrent logons from different workstations occur.
The Mainframe Product must generate audit records when successful/unsuccessful accesses to objects occur.
The Mainframe Product must generate audit records for all direct access to the information system.
The Mainframe Product must generate audit records for all account creations, modifications, disabling, and termination events.
The Mainframe Product must generate audit records for all kernel module load, unload, and restart events, and for all program initiations.
The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.
The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
Azure SQL DB must be able to generate audit records when security objects are accessed.
Azure SQL DB must generate audit records when unsuccessful attempts to access security objects occur.
Azure SQL DB must generate audit records when categorized information (e.g., classification levels/security levels) is accessed.
Azure SQL DB must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
Azure SQL DB must generate audit records when privileges/permissions are added.
Azure SQL DB must generate audit records when unsuccessful attempts to add privileges/permissions occur.
Azure SQL DB must generate audit records when privileges/permissions are modified.
Azure SQL DB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
Azure SQL Database must generate audit records when security objects are modified.
Azure SQL DB must generate audit records when unsuccessful attempts to modify security objects occur.
Azure SQL Database must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
Azure SQL Database must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
Azure SQL Database must generate audit records when privileges/permissions are deleted.
Azure SQL Database must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
Azure SQL Database must generate audit records when security objects are deleted.
Azure SQL Database must generate audit records when unsuccessful attempts to delete security objects occur.
Azure SQL Database must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
Azure SQL Database must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
Azure SQL Database must generate audit records when successful logons or connections occur.
Azure SQL Database must generate audit records when unsuccessful logons or connection attempts occur.
Azure SQL Database must generate audit records for all privileged activities or other system-level access.
Azure SQL Database must generate audit records for all unsuccessful attempts to execute privileged activities or other system-level access.
Azure SQL Database must generate audit records when concurrent logons/connections by the same user from different workstations occur.
Azure SQL Database must be able to generate audit records when successful accesses to objects occur.
Azure SQL Database must generate audit records when unsuccessful accesses to objects occur.
Azure SQL Database must generate audit records for all direct access to the database(s).
Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is accessed.
Trace or Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
SQL Server must generate Trace or Audit records when privileges/permissions are modified via locally-defined security objects.
SQL Server must generate Trace or Audit records when unsuccessful attempts to modify privileges/permissions via locally-defined security objects occur.
SQL Server must generate Trace or Audit records when locally-defined security objects are modified.
SQL Server must generate Trace or Audit records when unsuccessful accesses to designated objects occur.
SQL Server must generate Trace or Audit records when successful accesses to designated objects occur.
Trace or Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
SQL Server must generate Trace or Audit records when unsuccessful attempts to drop locally-defined security objects occur.
SQL Server must generate Trace or Audit records when locally-defined security objects are dropped.
SQL Server must generate Trace or Audit records when unsuccessful attempts to modify locally-defined security objects occur.
Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
Trace or Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.
Where SQL Server Audit is in use, SQL Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
SQL Server must produce Trace or Audit records when security objects are accessed.
SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur.
SQL Server must generate Trace or Audit records when privileges/permissions are added.
SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur.
SQL Server must generate Trace or Audit records when privileges/permissions are deleted.
SQL Server must generate Trace or Audit records when unsuccessful attempts to delete privileges/permissions occur.
SQL Server must generate Trace or Audit records when successful logons or connections occur.
SQL Server must generate Trace or Audit records when unsuccessful logons or connection attempts occur.
SQL Server must generate Trace or Audit records for all privileged activities or other system-level access.
SQL Server must generate Trace or Audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
SQL Server must generate Trace or Audit records when logoffs or disconnections occur.
SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.
The network device must generate audit records when successful/unsuccessful attempts to access privileges occur.
The network device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
The network device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The network device must generate audit records when successful/unsuccessful logon attempts occur.
The network device must generate audit records for privileged activities or other system-level access.
The network device must generate audit records showing starting and ending time for administrator access to the system.
The network device must generate audit records when concurrent logons from different workstations occur.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the chown privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the creat privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the open-related privileged commands.
Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the truncate-related privileged commands.
Nutanix AOS must generate audit records for file access actions.
Nutanix AOS must generate audit records for file ownership actions.
Nutanix AOS must generate audit records for file permission actions.
Nutanix AOS must generate audit records for file extended attribute actions.
Nutanix AOS must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify privileges occur.
Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify security objects occur.
Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify categories of information occur.
Nutanix AOS must audit attempts to modify or delete security objects.
Nutanix AOS must generate audit records when successful/unsuccessful logon attempts occur.
Nutanix AOS must generate audit records for privileged security activities.
Nutanix AOS must generate audit records for privileged account activities.
Nutanix AOS must be configured to audit the loading and unloading of dynamic kernel modules.
Nutanix AOS must generate audit records when concurrent logons to the same account occur from different sources.
Nutanix AOS must generate audit records when successful/unsuccessful accesses to objects occur.
Nutanix AOS must generate audit records for all direct access to the information system.
Nutanix AOS must generate audit records for all account creations, modifications, disabling, and termination events.
Oracle WebLogic must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
Oracle WebLogic must generate audit records for the DoD-selected list of auditable events.
The configuration integrity of the container platform must be ensured and runtime policies must be configured.
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
Innoslate must generate comprehensive audit records.
Innoslate must generate audit records when DoD required events occur.
Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.
Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
Symantec ProxySG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access web resources occur.
The TippingPoint SMS must generate audit records when successful/unsuccessful logon attempts occur.
The UEM server must generate audit records when successful/unsuccessful attempts to access privileges occur.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The UEM server must generate audit records when successful/unsuccessful attempts to access security objects occur.
The UEM server must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The UEM server must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The UEM server must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The UEM server must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The UEM server must generate audit records when successful/unsuccessful logon attempts occur.
The UEM server must generate audit records for privileged activities or other system-level access.
The UEM server must generate audit records showing starting and ending time for user access to the system.
The UEM server must generate audit records when concurrent logons from different workstations occur.
The UEM server must generate audit records when successful/unsuccessful accesses to objects occur.
The UEM server must generate audit records for all direct access to the information system.
The UEM server must generate audit records for all account creations, modifications, disabling, and termination events.
The NSX-T Manager must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The NSX-T Tier-1 Gateway Firewall must generate traffic log entries containing information to establish the details of the event.
The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
AccessLogValve must be configured for each application context.
AccessLogValve must be configured per each virtual host.
AccessLogValve must be configured for Catalina engine.
Changes to $CATALINA_HOME/bin/ folder must be logged.
Changes to $CATALINA_BASE/conf/ folder must be logged.
Changes to $CATALINA_HOME/lib/ folder must be logged.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.
The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.
The macOS system must generate audit records for DoD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
The macOS system must generate audit records for DOD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.
The macOS system must be configured to audit all administrative action events.
The macOS system must be configured to audit all log on and log out events.
The macOS system must enable security auditing.
The macOS system must be configured to audit all deletions of object attributes.
The macOS system must be configured to audit all changes of object attributes.
The macOS system must be configured to audit all failed read actions on the system.
The macOS system must be configured to audit all failed write actions on the system.
The macOS system must be configured to audit all failed program execution on the system.
The macOS system must configure system to audit all authorization and authentication events.
The Ubuntu operating system must generate audit records for the use and modification of the tallylog file.
The Ubuntu operating system must generate audit records for the use and modification of faillog file.
The Ubuntu operating system must generate audit records for the use and modification of the lastlog file.
The Ubuntu operating system must generate audit records for privileged activities or other system-level access.
The Ubuntu operating system must generate audit records for the /var/log/wtmp file.
The Ubuntu operating system must generate audit records for the /var/run/utmp file.
The Ubuntu operating system must generate audit records for the /var/log/btmp file.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the su command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chfn command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the mount command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the umount command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-agent command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-keysign command.
The Ubuntu operating system must generate audit records for any usage of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudo command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudoedit command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chsh command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the newgrp command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chcon command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the apparmor_parser command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the setfacl command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chacl command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the passwd command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the unix_update command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the gpasswd command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chage command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the usermod command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the crontab command.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.
The Ubuntu operating system must generate audit records upon successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
The Ubuntu operating system must generate records for successful/unsuccessful uses of init_module or finit_module syscalls.
The Ubuntu operating system must generate records for successful/unsuccessful uses of delete_module syscall and when unloading dynamic kernel modules.
The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use modprobe command.
The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use the kmod command.
The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use the fdisk command.
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
The Ubuntu operating system must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the init_module and finit_module syscalls.
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the delete_module syscall.
The Ubuntu operating system must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
The Ubuntu operating system must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
PostgreSQL must generate audit records when categorized information (e.g., classification levels/security levels) is accessed.
PostgreSQL must generate audit records when unsuccessful attempts to access security objects occur.
PostgreSQL must generate audit records when unsuccessful logons or connection attempts occur.
PostgreSQL must generate audit records showing starting and ending time for user access to the database(s).
PostgreSQL must generate audit records when unsuccessful attempts to modify security objects occur.
PostgreSQL must generate audit records when privileges/permissions are added.
PostgreSQL must generate audit records when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
PostgreSQL must generate audit records when successful logons or connections occur.
PostgreSQL must generate audit records when security objects are deleted.
PostgreSQL must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
PostgreSQL must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
PostgreSQL must be able to generate audit records when privileges/permissions are retrieved.
PostgreSQL must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
PostgreSQL must generate audit records when unsuccessful accesses to objects occur.
PostgreSQL must generate audit records for all privileged activities or other system-level access.
PostgreSQL must generate audit records when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
PostgreSQL must be able to generate audit records when security objects are accessed.
PostgreSQL must generate audit records when privileges/permissions are deleted.
PostgreSQL must generate audit records when concurrent logons/connections by the same user from different workstations occur.
PostgreSQL must generate audit records when unsuccessful attempts to delete security objects occur.
PostgreSQL must generate audit records when privileges/permissions are modified.
PostgreSQL must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
PostgreSQL must generate audit records when security objects are modified.
PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) is modified.
PostgreSQL must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
PostgreSQL must generate audit records when unsuccessful attempts to add privileges/permissions occur.
Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
PostgreSQL must generate audit records when successful accesses to objects occur.
PostgreSQL must generate audit records for all direct access to the database(s).
The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
The Cisco ASA VPN remote access server must be configured to generate log records when successful and/or unsuccessful VPN connection attempts occur.
The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
The Cisco ASA must be configured to generate audit records when successful/unsuccessful logon attempts occur.
The Cisco ASA must be configured to generate audit records for privileged activities or other system-level access.
The Cisco ASA must be configured to generate audit records showing starting and ending time for administrator access to the system.
The Cisco ASA must be configured to generate audit records when concurrent logons from different workstations occur.
The Cisco device must be configured to audit all administrator activity.
The Cisco router must be configured to generate log records when administrator privileges are deleted.
The Cisco router must be configured to generate audit records when successful/unsuccessful logon attempts occur.
The Cisco router must be configured to generate log records for privileged activities.
The Cisco switch must be configured to generate log records when administrator privileges are deleted.
The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.
The Cisco switch must be configured to generate log records for privileged activities.
The Cisco router must be configured to generate audit records when successful/unsuccessful attempts to logon with access privileges occur.
The Cisco ISE must generate audit records when successful attempts to access privileges occur.
The Cisco ISE must generate audit records when successful attempts to modify administrator privileges occur.
The Cisco ISE must generate audit records when successful attempts to delete administrator privileges occur.
The Cisco ISE must generate audit records when successful logon attempts occur.
The Cisco ISE must generate audit records for privileged activities or other system-level access.
The Cisco ISE must generate audit records when concurrent logons from different workstations occur.
The Cisco ISE must generate a log record when an endpoint fails authentication. This is This is required for compliance with C2C Step 1.
The Cisco ISE must generate a log record when the client machine fails posture assessment because required security software is missing or has been deleted. This is This is required for compliance with C2C Step 1.
The Cisco ISE must send an alert to the system administrator, at a minimum, when endpoints fail the policy assessment checks for organization-defined infractions. This is required for compliance with C2C Step 3.
The Cisco switch must be configured to generate log records when administrator privileges are modified.
The Cisco switch must generate audit records showing starting and ending time for administrator access to the system.
The DBMS must be able to generate audit records when privileges/permissions are retrieved.
The DBMS must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
The container platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
The container platform must generate audit records when successful/unsuccessful attempts to access security objects occur.
The container platform must generate audit records when successful/unsuccessful attempts to access security levels occur.
The container platform must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The container platform must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The container platform must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The container platform must generate audit records when successful/unsuccessful attempts to modify security levels occur.
The container platform must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
The container platform must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The container platform must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The container platform must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The container platform must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
The container platform must generate audit records when successful/unsuccessful logon attempts occur.
The container platform must generate audit record for privileged activities.
The container platform audit records must record user access start and end times.
The container platform must generate audit records when concurrent logons from different workstations and systems occur.
The container platform runtime must generate audit records when successful/unsuccessful attempts to access objects occur.
Direct access to the container platform must generate audit records.
The container platform must generate audit records for all account creations, modifications, disabling, and termination events.
The container runtime must generate audit records for all container execution, shutdown, restart events, and program initiations.
The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
The DBMS must be able to generate audit records when security objects are accessed.
The DBMS must generate audit records when unsuccessful attempts to access security objects occur.
The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
The DBMS must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
The DBMS must generate audit records when privileges/permissions are added.
The DBMS must generate audit records when unsuccessful attempts to add privileges/permissions occur.
The DBMS must generate audit records when privileges/permissions are modified.
The DBMS must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
The DBMS must generate audit records when security objects are modified.
The DBMS must generate audit records when unsuccessful attempts to modify security objects occur.
The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
The DBMS must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
The DBMS must generate audit records when privileges/permissions are deleted.
The DBMS must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
The DBMS must generate audit records when security objects are deleted.
The DBMS must generate audit records when unsuccessful attempts to delete security objects occur.
The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
The DBMS must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
The DBMS must generate audit records when successful logons or connections occur.
The DBMS must generate audit records when unsuccessful logons or connection attempts occur.
The DBMS must generate audit records for all privileged activities or other system-level access.
The DBMS must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
The DBMS must generate audit records showing starting and ending time for user access to the database(s).
The DBMS must generate audit records when concurrent logons/connections by the same user from different workstations occur.
The DBMS must be able to generate audit records when successful accesses to objects occur.
The DBMS must generate audit records when unsuccessful accesses to objects occur.
The DBMS must generate audit records for all direct access to the database(s).
The EDB Postgres Advanced Server must generate audit records when security objects are accessed.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.
The EDB Postgres Advanced Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
The EDB Postgres Advanced Server must generate audit records when privileges/permissions are added.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
The EDB Postgres Advanced Server must generate audit records when privileges/permissions are modified.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
The EDB Postgres Advanced Server must generate audit records when security objects are modified.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify security objects occur.
Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
The EDB Postgres Advanced Server must generate audit records when security objects are deleted.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete security objects occur.
Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
The EDB Postgres Advanced Server must generate audit records when successful logons or connections occur.
The EDB Postgres Advanced Server must generate audit records when unsuccessful logons or connection attempts occur.
The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).
The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.
The EDB Postgres Advanced Server must generate audit records when unsuccessful accesses to objects occur.
The EDB Postgres Advanced Server must generate audit records for all direct access to the database(s).
The operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.
The operating system must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The operating system must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The operating system must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The operating system must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
The operating system must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The operating system must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The operating system must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The operating system must generate audit records when successful/unsuccessful logon attempts occur.
The operating system must generate audit records for privileged activities or other system-level access.
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
The operating system must generate audit records showing starting and ending time for user access to the system.
The operating system must generate audit records when concurrent logons to the same account occur from different sources.
The operating system must generate audit records when successful/unsuccessful accesses to objects occur.
The operating system must generate audit records for all direct access to the information system.
The operating system must generate audit records for all account creations, modifications, disabling, and termination events.
The operating system must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM z/OS Required SMF data record types must be collected.
IBM RACF SETROPTS LOGOPTIONS must be properly configured.
The IBM RACF SETROPTS SAUDIT value must be specified.
IBM z/OS required SMF data record types must be collected.
The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
The ICS must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
The Juniper EX switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.
The Juniper EX switch must be configured to generate audit records for privileged activities or other system-level access.
The Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.
The Juniper EX switch must be configured to generate audit records when concurrent logons from different workstations occur.
Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
MarkLogic Server must be able to generate audit records when privileges/permissions are retrieved.
MarkLogic Server must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
MarkLogic Server must be able to generate audit records when security objects are accessed.
MarkLogic Server must generate audit records when unsuccessful attempts to access security objects occur.
MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
MariaDB must be able to generate audit records when privileges/permissions are retrieved.
MariaDB must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
MariaDB must be able to generate audit records when security objects are accessed.
MariaDB must generate audit records when unsuccessful attempts to access security objects occur.
MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
MarkLogic Server must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
MarkLogic Server must generate audit records when privileges/permissions are added.
MarkLogic Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
MarkLogic Server must generate audit records when privileges/permissions are modified.
MarkLogic Server must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
MarkLogic Server must generate audit records when security objects are modified.
MarkLogic Server must generate audit records when unsuccessful attempts to modify security objects occur.
MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
MarkLogic Server must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
MarkLogic Server must generate audit records when privileges/permissions are deleted.
MarkLogic Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
MarkLogic Server DBMS must generate audit records when security objects are deleted.
MarkLogic Server must generate audit records when unsuccessful attempts to delete security objects occur.
MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
MarkLogic Server must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
MarkLogic Server must generate audit records when successful logons or connections occur.
MarkLogic Server must generate audit records when unsuccessful logons or connection attempts occur.
MarkLogic Server must generate audit records for all privileged activities or other system-level access.
MarkLogic Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
MarkLogic Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
MarkLogic must be able to generate audit records when successful accesses to objects occur.
MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
MariaDB must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
MariaDB must generate audit records when privileges/permissions are added.
MariaDB must generate audit records when unsuccessful attempts to add privileges/permissions occur.
MariaDB must generate audit records when privileges/permissions are modified.
MariaDB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
MariaDB must generate audit records when security objects are modified.
MariaDB must generate audit records when unsuccessful attempts to modify security objects occur.
MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
MariaDB must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
MariaDB must generate audit records when privileges/permissions are deleted.
MariaDB must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
MariaDB must generate audit records when security objects are deleted.
MariaDB must generate audit records when unsuccessful attempts to delete security objects occur.
MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
MariaDB must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
MariaDB must generate audit records when successful logons or connections occur.
MariaDB must generate audit records when unsuccessful logons or connection attempts occur.
MariaDB must generate audit records for all privileged activities or other system-level access.
MariaDB must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
MariaDB must generate audit records showing starting and ending time for user access to the database(s).
MariaDB must generate audit records when concurrent logons/connections by the same user from different workstations occur.
MariaDB must be able to generate audit records when successful accesses to objects occur.
MariaDB must generate audit records when unsuccessful accesses to objects occur.
MariaDB must generate audit records for all direct access to the database(s).
SQL Server must generate audit records when successful/unsuccessful attempts to retrieve privileges/permissions occur.
SQL Server must be able to generate audit records when successful and unsuccessful attempts to access security objects occur.
SQL Server must generate audit records when successful and unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
SQL Server must generate audit records when successful and unsuccessful attempts to add privileges/permissions occur.
SQL Server must generate audit records when successful and unsuccessful attempts to modify privileges/permissions occur.
SQL Server must generate audit records when successful and unsuccessful attempts to modify security objects occur.
SQL Server must generate audit records when successful and unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
SQL Server must generate audit records when successful and unsuccessful attempts to delete privileges/permissions occur.
SQL Server must generate audit records when successful and unsuccessful attempts to delete security objects occur.
SQL Server must generate audit records when successful and unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
SQL Server must generate audit records when successful and unsuccessful logons or connection attempts occur.
SQL Server must generate audit records for all privileged activities or other system-level access.
SQL Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
SQL Server must generate audit records showing starting and ending time for user access to the database(s).
SQL Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
SQL Server must generate audit records when successful and unsuccessful accesses to objects occur.
SQL Server must generate audit records for all direct access to the database(s).
The system must be configured to audit Account Logon - Credential Validation failures.
The system must be configured to audit Account Logon - Credential Validation successes.
The system must be configured to audit Account Management - Security Group Management successes.
The system must be configured to audit Account Management - User Account Management failures.
The system must be configured to audit Account Management - User Account Management successes.
The system must be configured to audit Detailed Tracking - PNP Activity successes.
The system must be configured to audit Detailed Tracking - Process Creation successes.
The system must be configured to audit Logon/Logoff - Account Lockout failures.
The system must be configured to audit Logon/Logoff - Group Membership successes.
The system must be configured to audit Logon/Logoff - Logoff successes.
The system must be configured to audit Logon/Logoff - Logon failures.
The system must be configured to audit Logon/Logoff - Logon successes.
The system must be configured to audit Logon/Logoff - Special Logon successes.
Windows 10 must be configured to audit Object Access - File Share failures.
Windows 10 must be configured to audit Object Access - File Share successes.
Windows 10 must be configured to audit Object Access - Other Object Access Events successes.
Windows 10 must be configured to audit Object Access - Other Object Access Events failures.
The system must be configured to audit Object Access - Removable Storage failures.
The system must be configured to audit Object Access - Removable Storage successes.
The system must be configured to audit Policy Change - Audit Policy Change successes.
The system must be configured to audit Policy Change - Authentication Policy Change successes.
The system must be configured to audit Policy Change - Authorization Policy Change successes.
The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
The system must be configured to audit Privilege Use - Sensitive Privilege Use successes.
The system must be configured to audit System - IPSec Driver failures.
The system must be configured to audit System - Other System Events successes.
The system must be configured to audit System - Other System Events failures.
The system must be configured to audit System - Security State Change successes.
The system must be configured to audit System - Security System Extension successes.
The system must be configured to audit System - System Integrity failures.
The system must be configured to audit System - System Integrity successes.
Unused accounts must be disabled or removed from the system after 35 days of inactivity.
Windows 11 must be configured to audit Object Access - File Share failures.
Windows 11 must be configured to audit Object Access - File Share successes.
Windows 11 must be configured to audit Object Access - Other Object Access Events successes.
Windows 11 must be configured to audit Object Access - Other Object Access Events failures.
The system must be configured to audit System - IPsec Driver failures.
Windows 11 Kernel (Direct Memory Access) DMA Protection must be enabled.
Windows Defender Firewall with Advanced Security must log dropped packets when connected to a domain.
Windows Defender Firewall with Advanced Security must log dropped packets when connected to a private network.
Windows Defender Firewall with Advanced Security must log dropped packets when connected to a public network.
Windows Server 2016 must be configured to audit Account Logon - Credential Validation successes.
Windows Server 2016 must be configured to audit Account Logon - Credential Validation failures.
Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2016 must be configured to audit Account Management - User Account Management successes.
Windows Server 2016 must be configured to audit Account Management - User Account Management failures.
Windows Server 2016 must be configured to audit Detailed Tracking - Plug and Play Events successes.
Windows Server 2016 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2016 must be configured to audit Logon/Logoff - Account Lockout failures.
Windows Server 2016 must be configured to audit Logon/Logoff - Group Membership successes.
Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes.
Windows Server 2016 must be configured to audit Logon/Logoff - Logon successes.
Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures.
Windows Server 2016 must be configured to audit Logon/Logoff - Special Logon successes.
Windows 2016 must be configured to audit Object Access - Other Object Access Events successes.
Windows 2016 must be configured to audit Object Access - Other Object Access Events failures.
Windows Server 2016 must be configured to audit Object Access - Removable Storage successes.
Windows Server 2016 must be configured to audit Object Access - Removable Storage failures.
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2016 must be configured to audit System - IPsec Driver successes.
Windows Server 2016 must be configured to audit System - IPsec Driver failures.
Windows Server 2016 must be configured to audit System - Other System Events successes.
Windows Server 2016 must be configured to audit System - Other System Events failures.
Windows Server 2016 must be configured to audit System - Security State Change successes.
Windows Server 2016 must be configured to audit System - Security System Extension successes.
Windows Server 2016 must be configured to audit System - System Integrity successes.
Windows Server 2016 must be configured to audit System - System Integrity failures.
Active Directory Group Policy objects must be configured with proper audit settings.
The Active Directory Domain object must be configured with proper audit settings.
The Active Directory Infrastructure object must be configured with proper audit settings.
The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
The Active Directory AdminSDHolder object must be configured with proper audit settings.
The Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes.
Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2019 must be configured to audit logon successes.
Windows Server 2019 must be configured to audit logon failures.
Windows Server 2019 must be configured to audit Logon/Logoff - Account Lockout failures.
Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2019 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2019 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2019 must be configured to audit System - IPsec Driver successes.
Windows Server 2019 must be configured to audit System - IPsec Driver failures.
Windows Server 2019 must be configured to audit System - Other System Events successes.
Windows Server 2019 must be configured to audit System - Other System Events failures.
Windows Server 2019 must be configured to audit System - Security State Change successes.
Windows Server 2019 must be configured to audit System - Security System Extension successes.
Windows Server 2019 must be configured to audit System - System Integrity successes.
Windows Server 2019 must be configured to audit System - System Integrity failures.
Windows Server 2019 Active Directory Group Policy objects must be configured with proper audit settings.
Windows Server 2019 Active Directory Domain object must be configured with proper audit settings.
Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Windows Server 2019 Active Directory AdminSDHolder object must be configured with proper audit settings.
Windows Server 2019 Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2019 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2019 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2019 must be configured to audit DS Access - Directory Service Changes successes.
Windows Server 2019 must be configured to audit Account Logon - Credential Validation successes.
Windows Server 2019 must be configured to audit Account Logon - Credential Validation failures.
Windows Server 2019 must be configured to audit Logon/Logoff - Group Membership successes.
Windows Server 2019 must be configured to audit Logon/Logoff - Special Logon successes.
Windows Server 2019 must be configured to audit Object Access - Other Object Access Events successes.
Windows Server 2019 must be configured to audit Object Access - Other Object Access Events failures.
Windows Server 2019 must be configured to audit logoff successes.
Windows Server 2019 must be configured to audit Detailed Tracking - Plug and Play Events successes.
Windows Server 2019 must be configured to audit Object Access - Removable Storage successes.
Windows Server 2019 must be configured to audit Object Access - Removable Storage failures.
Windows Server 2022 must be configured to audit Account Logon - Credential Validation successes.
Windows Server 2022 must be configured to audit Account Logon - Credential Validation failures.
Windows Server 2022 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2022 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2022 must be configured to audit Account Management - User Account Management successes.
Windows Server 2022 must be configured to audit Account Management - User Account Management failures.
Windows Server 2022 must be configured to audit Detailed Tracking - Plug and Play Events successes.
Windows Server 2022 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2022 must be configured to audit Logon/Logoff - Account Lockout failures.
Windows Server 2022 must be configured to audit Logon/Logoff - Group Membership successes.
Windows Server 2022 must be configured to audit logoff successes.
Windows Server 2022 must be configured to audit logon successes.
Windows Server 2022 must be configured to audit logon failures.
Windows Server 2022 must be configured to audit Logon/Logoff - Special Logon successes.
Windows Server 2022 must be configured to audit Object Access - Other Object Access Events successes.
Windows Server 2022 must be configured to audit Object Access - Other Object Access Events failures.
Windows Server 2022 must be configured to audit Object Access - Removable Storage successes.
Windows Server 2022 must be configured to audit Object Access - Removable Storage failures.
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2022 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2022 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2022 must be configured to audit System - IPsec Driver successes.
Windows Server 2022 must be configured to audit System - IPsec Driver failures.
Windows Server 2022 must be configured to audit System - Other System Events successes.
Windows Server 2022 must be configured to audit System - Other System Events failures.
Windows Server 2022 must be configured to audit System - Security State Change successes.
Windows Server 2022 must be configured to audit System - Security System Extension successes.
Windows Server 2022 must be configured to audit System - System Integrity successes.
Windows Server 2022 must be configured to audit System - System Integrity failures.
Windows Server 2022 Active Directory Group Policy objects must be configured with proper audit settings.
Windows Server 2022 Active Directory Domain object must be configured with proper audit settings.
Windows Server 2022 Active Directory Infrastructure object must be configured with proper audit settings.
Windows Server 2022 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Windows Server 2022 Active Directory AdminSDHolder object must be configured with proper audit settings.
Windows Server 2022 Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2022 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2022 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2022 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2022 must be configured to audit DS Access - Directory Service Changes successes.
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The DBMS must generate audit records for the DoD-selected list of auditable events, to the extent such information is available.
The Oracle Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.
The Oracle Linux operating system must audit all uses of the chmod, fchmod, and fchmodat syscalls.
The Oracle Linux operating system must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The Oracle Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The Oracle Linux operating system must audit all uses of the semanage command.
The Oracle Linux operating system must generate audit records for all unsuccessful account access events.
The Oracle Linux operating system must generate audit records for all successful account access events.
The Oracle Linux operating system must audit all uses of the su command.
The Oracle Linux operating system must audit all uses of the sudo command.
The Oracle Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Oracle Linux operating system must audit all uses of the newgrp command.
The Oracle Linux operating system must audit all uses of the pam_timestamp_check command.
The Oracle Linux operating system must audit all uses of the create_module syscall.
The Oracle Linux operating system must audit all uses of the init_module and finit_module syscalls.
The Oracle Linux operating system must audit all uses of the delete_module syscall.
The Oracle Linux operating system must audit all uses of the kmod command.
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
The Oracle Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
PostgreSQL must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OL 8 must generate audit records for any use of the "su" command.
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
OL 8 must generate audit records for any use of the "chage" command.
OL 8 must generate audit records for any uses of the "chcon" command.
OL 8 must generate audit records for any use of the "ssh-agent" command.
OL 8 must generate audit records for any use of the "passwd" command.
OL 8 must generate audit records for any use of the "mount" command.
OL 8 must generate audit records for any use of the "umount" command.
OL 8 must generate audit records for any use of the "mount" syscall.
OL 8 must generate audit records for any use of the "unix_update" command.
OL 8 must generate audit records for any use of the "postdrop" command.
OL 8 must generate audit records for any use of the "postqueue" command.
OL 8 must generate audit records for any use of the "setsebool" command.
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
OL 8 must generate audit records for any use of the "ssh-keysign" command.
OL 8 must generate audit records for any use of the "setfacl" command.
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
OL 8 must generate audit records for any use of the "newgrp" command.
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
OL 8 must generate audit records for any use of the "gpasswd" command.
OL 8 must generate audit records for any use of the delete_module syscall.
OL 8 must generate audit records for any use of the "crontab" command.
OL 8 must generate audit records for any use of the "chsh" command.
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
OL 8 must generate audit records for any use of the "sudo" command.
OL 8 must generate audit records for any use of the "usermod" command.
OL 8 must generate audit records for any use of the "chacl" command.
OL 8 must generate audit records for any use of the "kmod" command.
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
OL 8 must enable auditing of processes that start prior to the audit daemon.
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
OL 8 must enable Linux audit logging for the USBGuard daemon.
The MySQL Database Server 8.0 must be able to generate audit records when privileges/permissions are retrieved.
The MySQL Database Server 8.0 must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
The MySQL Database Server 8.0 must be able to generate audit records when security objects are accessed.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access security objects occur.
The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
The MySQL Database Server 8.0 must generate audit records when privileges/permissions are added.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to add privileges/permissions occur.
The MySQL Database Server 8.0 must generate audit records when privileges/permissions are modified.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
The MySQL Database Server 8.0 must generate audit records when security objects are modified.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify security objects occur.
The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
The MySQL Database Server 8.0 must generate audit records when privileges/permissions are deleted.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
The MySQL Database Server 8.0 must generate audit records when security objects are deleted.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete security objects occur.
The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
The MySQL Database Server 8.0 must generate audit records when successful logons or connections occur.
The MySQL Database Server 8.0 must generate audit records when unsuccessful logons or connection attempts occur.
The MySQL Database Server 8.0 must generate audit records for all privileged activities or other system-level access.
The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
The MySQL Database Server 8.0 must generate audit records showing starting and ending time for user access to the database(s).
The MySQL Database Server 8.0 must generate audit records when concurrent logons/connections by the same user from different workstations.
The MySQL Database Server 8.0 must be able to generate audit records when successful accesses to objects occur.
The MySQL Database Server 8.0 must generate audit records when unsuccessful accesses to objects occur.
The MySQL Database Server 8.0 must generate audit records for all direct access to the database(s).
The Palo Alto Networks security platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
Automation Controller must use external log providers that can collect user activity logs in independent, protected repositories to prevent modification or repudiation.
Redis Enterprise DBMS must generate audit records for all direct access to the database(s).
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
OpenShift must generate audit rules to capture account related actions.
OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur.
All audit records must identify what type of event has occurred within OpenShift.
OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.
OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.
OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.
OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.
OpenShift must generate audit records when successful/unsuccessful logon attempts occur.
Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules.
OpenShift audit records must record user access start and end times.
OpenShift must generate audit records when concurrent logons from different workstations and systems occur.
The Red Hat Enterprise Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the chmod, fchmod, and fchmodat syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the semanage command.
The Red Hat Enterprise Linux operating system must audit all uses of the setsebool command.
The Red Hat Enterprise Linux operating system must audit all uses of the chcon command.
The Red Hat Enterprise Linux operating system must audit all uses of the setfiles command.
The Red Hat Enterprise Linux operating system must generate audit records for all unsuccessful account access events.
The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.
The Red Hat Enterprise Linux operating system must audit all uses of the passwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the unix_chkpwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the gpasswd command.
The Red Hat Enterprise Linux operating system must audit all uses of the chage command.
The Red Hat Enterprise Linux operating system must audit all uses of the userhelper command.
The Red Hat Enterprise Linux operating system must audit all uses of the su command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudo command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.
The Red Hat Enterprise Linux operating system must audit all uses of the chsh command.
The Red Hat Enterprise Linux operating system must audit all uses of the ssh-keysign command.
The Red Hat Enterprise Linux operating system must audit all uses of the crontab command.
The Red Hat Enterprise Linux operating system must audit all uses of the pam_timestamp_check command.
The Red Hat Enterprise Linux operating system must audit all uses of the create_module syscall.
The Red Hat Enterprise Linux operating system must audit all uses of the init_module and finit_module syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the delete_module syscall.
The Red Hat Enterprise Linux operating system must audit all uses of the kmod command.
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
The Red Hat Enterprise Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
The SUSE operating system must have the auditing package installed.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
The SUSE operating system must generate audit records for all uses of the su command.
The SUSE operating system must generate audit records for all uses of the sudo command.
The SUSE operating system must generate audit records for all uses of the chfn command.
The SUSE operating system must generate audit records for all uses of the mount command.
The SUSE operating system must generate audit records for all uses of the umount command.
The SUSE operating system must generate audit records for all uses of the ssh-agent command.
The SUSE operating system must generate audit records for all uses of the ssh-keysign command.
The SUSE operating system must generate audit records for all uses of the kmod command.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the gpasswd command.
The SUSE operating system must generate audit records for all uses of the newgrp command.
The SUSE operating system must generate audit records for a uses of the chsh command.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
The SUSE operating system must generate audit records for all uses of the chmod command.
The SUSE operating system must generate audit records for all uses of the setfacl command.
The SUSE operating system must generate audit records for all uses of the chacl command.
Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
The SUSE operating system must generate audit records for all uses of the rm command.
The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
The SUSE operating system must generate audit records for all modifications to the lastlog file.
The SUSE operating system must generate audit records for all uses of the passmass command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd command.
The SUSE operating system must generate audit records for all uses of the chage command.
The SUSE operating system must generate audit records for all uses of the usermod command.
The SUSE operating system must generate audit records for all uses of the crontab command.
The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
The SUSE operating system must generate audit records for all uses of the delete_module command.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
The SUSE operating system must generate audit records for all modifications to the faillog file.
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
RHEL 9 audit package must be installed.
RHEL 9 audit service must be enabled.
RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL 9 must audit all uses of umount system calls.
RHEL 9 must audit all uses of the chacl command.
RHEL 9 must audit all uses of the setfacl command.
RHEL 9 must audit all uses of the chcon command.
RHEL 9 must audit all uses of the semanage command.
RHEL 9 must audit all uses of the setfiles command.
RHEL 9 must audit all uses of the setsebool command.
RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL 9 must audit all uses of the delete_module system call.
RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL 9 must audit all uses of the chage command.
RHEL 9 must audit all uses of the chsh command.
RHEL 9 must audit all uses of the crontab command.
RHEL 9 must audit all uses of the gpasswd command.
RHEL 9 must audit all uses of the kmod command.
RHEL 9 must audit all uses of the newgrp command.
RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL 9 must audit all uses of the passwd command.
RHEL 9 must audit all uses of the postdrop command.
RHEL 9 must audit all uses of the postqueue command.
RHEL 9 must audit all uses of the ssh-agent command.
RHEL 9 must audit all uses of the ssh-keysign command.
RHEL 9 must audit all uses of the su command.
RHEL 9 must audit all uses of the sudo command.
RHEL 9 must audit all uses of the sudoedit command.
RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL 9 must audit all uses of the unix_update command.
RHEL 9 must audit all uses of the userhelper command.
RHEL 9 must audit all uses of the usermod command.
RHEL 9 must audit all uses of the mount command.
Successful/unsuccessful uses of the init command in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the poweroff command in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the reboot command in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the shutdown command in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
RHEL 9 audit system must protect logon UIDs from unauthorized change.
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd or unix2_chkpwd commands.
The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.
The SUSE operating system must generate audit records for all uses of the sudoedit command.
The SUSE operating system must generate audit records for all uses of the mount system call.
The SUSE operating system must generate audit records for all uses of the umount system call.
The SUSE operating system must generate audit records for all uses of the insmod command.
The SUSE operating system must generate audit records for all uses of the rmmod command.
The SUSE operating system must generate audit records for all uses of the modprobe command.
The SUSE operating system must generate audit records for all uses of the chcon command.
The SUSE operating system must generate audit records for all uses of the delete_module system call.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat, and rmdir system calls.
The SUSE operating system must generate audit records for the /run/utmp file.
The SUSE operating system must generate audit records for the /var/log/wtmp file.
The SUSE operating system must generate audit records for the /var/log/btmp file.
The operating system must generate audit records for the selected list of auditable events as defined in DoD list of events.
The VMM must generate audit records when successful/unsuccessful attempts to access privileges occur.
The VMM must generate audit records when successful/unsuccessful attempts to access security objects occur.
The VMM must generate audit records when successful/unsuccessful attempts to access security levels occur.
The VMM must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
The VMM must generate audit records when successful/unsuccessful attempts to modify privileges occur.
The VMM must generate audit records when successful/unsuccessful attempts to modify security objects occur.
The VMM must generate audit records when successful/unsuccessful attempts to modify security levels occur.
The VMM must generate audit records when successful/unsuccessful attempts to delete privileges occur.
The VMM must generate audit records when successful/unsuccessful attempts to delete security levels occur.
The VMM must generate audit records when successful/unsuccessful attempts to delete security objects occur.
The VMM must generate audit records when successful/unsuccessful logon attempts occur.
The VMM must generate audit records for privileged activities or other system-level access.
The VMM must generate audit records showing starting and ending time for user access to the system.
The VMM must generate audit records when concurrent logons from different workstations occur.
The VMM must generate audit records when successful/unsuccessful accesses to objects occur.
The VMM must generate audit records for all direct access to the VMM.
The VMM must generate audit records for all account creations, modifications, disabling, and termination events.
The VMM must generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
The Photon operating system must have the auditd service running.
The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
The Photon operating system must audit the execution of privileged functions.
The Photon operating system must generate audit records when the sudo command is used.
The Photon operating system must generate audit records when successful/unsuccessful logon attempts occur.
The Photon operating system must audit the "insmod" module.
The Photon operating system auditd service must generate audit records for all account creations, modifications, disabling, and termination events.
The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
The vCenter server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
VMware Postgres must have log collection enabled.
vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
The vCenter Lookup service must produce log records containing sufficient information regarding event details.
The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
The Photon operating system must audit all account creations.
The Photon operating system must be configured to audit the loading and unloading of dynamic kernel modules.
The Photon operating system must audit all account modifications.
The vCenter PostgreSQL service must generate audit records.
The vCenter PostgreSQL service must log all connection attempts.
The vCenter PostgreSQL service must log all client disconnections.
The vCenter STS service must produce log records containing sufficient information regarding event details.
The vCenter UI service must produce log records containing sufficient information regarding event details.
The EDB Postgres Advanced Server must generate audit records for DoD-defined auditable events.
The EDB Postgres Advanced Server must generate audit records when successful/unsuccessful logons, connections, or connection attempts occur.
The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s) and concurrent logons/connections by the same user from different workstations.
The macOS system must configure the system to audit all authorization and authentication events.
The macOS system must configure sudo to log events.
The macOS system must be configured to audit all login and logout events.
The macOS system must be configured to audit all authorization and authentication events.
Ubuntu 22.04 LTS must have the "auditd" package installed.
Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the apparmor_parser command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chacl command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chage command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chcon command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chfn command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chsh command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the crontab command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use the fdisk command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the gpasswd command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use the kmod command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use modprobe command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the mount command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the newgrp command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the passwd command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the setfacl command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-agent command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-keysign command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the su command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the sudo command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the sudoedit command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the umount command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the unix_update command.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the usermod command.
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the delete_module system call.
Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the init_module and finit_module system calls.
Ubuntu 22.04 LTS must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
Ubuntu 22.04 LTS must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
Ubuntu 22.04 LTS must generate audit records for the /var/log/btmp file.
Ubuntu 22.04 LTS must generate audit records for the /var/log/wtmp file.
Ubuntu 22.04 LTS must generate audit records for the /var/run/utmp file.
Ubuntu 22.04 LTS must generate audit records for the use and modification of faillog file.
Ubuntu 22.04 LTS must generate audit records for the use and modification of the lastlog file.
Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur.
Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur.
Ubuntu 22.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
PostgreSQL must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
PostgreSQL must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
PostgreSQL must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
PostgreSQL must be able to generate audit records when successful accesses to objects occur.
The Enterprise Voice, Video, and Messaging Endpoint must generate audit records when successful/unsuccessful logon attempts occur.
The Enterprise Voice, Video, and Messaging Endpoint must generate audit records for privileged activities or other system-level access.
The Enterprise Voice, Video, and Messaging Endpoint must generate audit records showing starting and ending time for user access to the system.
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
The Enterprise Voice, Video, and Messaging Session Manager must generate session (call) records when concurrent logons from multiple endpoints occur.
When using locally stored user accounts, the Enterprise Voice, Video, and Messaging Session Manager must generate audit records for all account creations, modifications, disabling, and termination events.
The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
MKE must be configured to integrate with an Enterprise Identity Provider.
Audit logging must be enabled on MKE.
MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
The OL 8 audit package must be installed.
SLEM 5 must have the auditing package installed.
SLEM 5 must generate audit records for all uses of the "chage" command.
SLEM 5 must generate audit records for all uses of the "chcon" command.
SLEM 5 must generate audit records for all uses of the "chfn" command.
SLEM 5 must generate audit records for all uses of the "chmod" command.
SLEM 5 must generate audit records for a uses of the "chsh" command.
SLEM 5 must generate audit records for all uses of the "crontab" command.
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
SLEM 5 must generate audit records for all uses of the "insmod" command.
SLEM 5 must generate audit records for all uses of the "kmod" command.
SLEM 5 must generate audit records for all uses of the "modprobe" command.
SLEM 5 must generate audit records for all uses of the "newgrp" command.
SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
SLEM 5 must generate audit records for all uses of the "passwd" command.
SLEM 5 must generate audit records for all uses of the "rm" command.
SLEM 5 must generate audit records for all uses of the "rmmod" command.
SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
SLEM 5 must generate audit records for all uses of the "su" command.
SLEM 5 must generate audit records for all uses of the "sudo" command.
SLEM 5 must generate audit records for all uses of the "sudoedit" command.
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
SLEM 5 must generate audit records for all uses of the "usermod" command.
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
SLEM 5 must generate audit records for all uses of the "delete_module" system call.
SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
SLEM 5 must generate audit records for all uses of the "mount" system call.
SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
SLEM 5 must generate audit records for all uses of the "umount" system call.
SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.
SLEM 5 must generate audit records for all modifications to the "lastlog" file.
SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.
SLEM 5 must generate audit records for the "/run/utmp file".
SLEM 5 must generate audit records for the "/var/log/btmp" file.
SLEM 5 must generate audit records for the "/var/log/wtmp" file.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record.
Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of postdrop in TOSS must generate an audit record.
Successful/unsuccessful uses of postqueue in TOSS must generate an audit record.
Successful/unsuccessful uses of setsebool in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record.
Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record.
Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record.
Successful/unsuccessful uses of setfiles in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the chmod system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the chown system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the creat system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the fchmod system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the fchmodat system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the fchown system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the fchownat system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the ftruncate system call system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the lchown system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the open system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the open_by_handle_at system call system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the openat system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the truncate system call in TOSS must generate an audit record.
The TOSS audit system must be configured to audit any usage of the "fsetxattr" system call.
The TOSS audit system must be configured to audit any usage of the "lsetxattr" system call.
Successful/unsuccessful uses of the fremovexattr system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the "lremovexattr" system call in TOSS must generate an audit record.
Successful/unsuccessful uses of the "removexattr" system call in TOSS must generate an audit record.
Successful/unsuccessful modifications to the "lastlog" file in TOSS must generate an audit record.
Successful/unsuccessful uses of "semanage" in TOSS must generate an audit record.
Successful/unsuccessful uses of the "gpasswd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "mount" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "mount" syscall in TOSS must generate an audit record.
Successful/unsuccessful uses of the "su" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "umount" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unix_update" in TOSS must generate an audit record.
Successful/unsuccessful uses of the "usermod" command in TOSS must generate an audit record.
Successful/unsuccessful uses of "unix_chkpwd" in TOSS must generate an audit record.
Successful/unsuccessful uses of "userhelper" in TOSS must generate an audit record.
Successful/unsuccessful uses of the "kmod" command in TOSS must generate an audit record.
The NSX Distributed Firewall must generate traffic log entries.
The NSX Manager must configure logging levels for services to ensure audit records are generated.
The NSX Tier-0 Gateway Firewall must generate traffic log entries.