CCI-001684
The information system notifies organization-defined personnel or roles for account modification actions.
6 rules found Severity: Medium

The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are modified.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Akamai Luna Portal must generate alerts that can be forwarded to the SAs and ISSO when accounts are modified.
1 rule found Severity: Medium

The DataPower Gateway must generate alerts that can be forwarded to the administrators and ISSO when accounts are modified.
1 rule found Severity: Medium

The MQ Appliance network device must generate account activity alerts that are forwarded to the administrators and Information System Security Officer (ISSO). Activity includes, creation, removal, modification and re-enablement after being previously disabled.
1 rule found Severity: Medium

Riverbed Optimization System (RiOS) must generate alerts that can be forwarded to the administrators and ISSO when accounts are modified.
1 rule found Severity: Low

Innoslate must use multifactor authentication for network access to privileged and non-privileged accounts.
1 rule found Severity: High

2 rules found Severity: Medium

The Tanium Operating System (TanOS) must audit and notify system administrators and ISSOs when accounts are modified.
1 rule found Severity: Medium

The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are modified.
1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, disabling).
1 rule found Severity: Low

1 rule found Severity: Low

Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, or disabling).
1 rule found Severity: Low

The Tanium Operating System (TanOS) must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
1 rule found Severity: Medium

Tanium must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.
1 rule found Severity: Medium

Tanium must notify system administrators and the information system security officer (ISSO) when accounts are modified.
1 rule found Severity: Medium

The application must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
1 rule found Severity: Low

The Dragos Platform must notify system administrators and information system security officer (ISSO) of local account activity.
1 rule found Severity: Medium

The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs.
1 rule found Severity: Low

Access to Prisma Cloud Compute must be managed based on user need and least privileged using external identity providers for authentication and grouping to role-based assignments when possible.
1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium
