CCI-002132
The information system notifies organization-defined personnel or roles for account enabling actions.
6 rules found Severity: Medium

The A10 Networks ADC must notify System Administrators (SAs) and Information System Security Officers (ISSMs) when accounts are created, or enabled when previously disabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Akamai Luna Portal must notify the SAs and ISSO when accounts are created, or enabled when previously disabled.
1 rule found Severity: Medium

The CA API Gateway must notify System Administrators (SAs) and Information System Security Officers (ISSMs) when accounts are created, or enabled when previously disabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The MQ Appliance network device must generate account activity alerts that are forwarded to the administrators and Information System Security Officer (ISSO). Activity includes, creation, removal, modification and re-enablement after being previously disabled.
1 rule found Severity: Medium

Innoslate must use multifactor authentication for network access to privileged and non-privileged accounts.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The BIG-IP appliance must be configured to generate an immediate alert for account-enabling actions.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

Tanium must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are enabled.
1 rule found Severity: Medium

Tanium must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
1 rule found Severity: Medium

Tanium must notify the system administrator and information system security officer (ISSO) of account enabling actions.
1 rule found Severity: Medium

The application must notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.
1 rule found Severity: Low

The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
1 rule found Severity: Medium

OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium
