Ensure auditd Collects Information on the Use of Privileged Commands
Record Events When Privileged Executables Are Run
The Akamai Luna Portal must audit the execution of privileged functions.
The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
The Arista network device must be configured to audit all administrator activity.
The application must audit the execution of privileged functions.
The DBN-6300 must audit the execution of privileged functions.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
The FortiGate device must audit the execution of privileged functions.
The HYCU server and Web UI must audit the execution of privileged functions.
The network device must enforce a minimum 15-character password length.
The DataPower Gateway must audit the execution of privileged functions.
The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
The WebSphere Liberty Server must log remote session and security activity.
The WebSphere Application Server security auditing must be enabled.
The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.
The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.
The WebSphere Application Server audit event type filters must be configured.
The WebSphere Application Server audit service provider must be enabled.
The JBoss server must be configured to log all admin activity.
The Juniper router must be configured to audit the execution of privileged functions.
The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.
The Mainframe Product must audit the execution of privileged functions.
The network device must audit the execution of privileged functions.
Nutanix AOS must audit the execution of privileged functions.
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Riverbed Optimization System (RiOS) must generate a log event when privileged functions are executed.
Innoslate must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The UEM server must audit the execution of privileged functions.
Application user name must be logged.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
The macOS system must be configured to audit all administrative action events.
The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
The Cisco ASA must be configured to audit the execution of privileged functions.
The Cisco device must be configured to audit all administrator activity.
The Cisco switch must be configured to audit the execution of privileged functions.
The container platform must audit the execution of privileged functions.
The operating system must audit the execution of privileged functions.
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM z/OS Required SMF data record types must be collected.
IBM Integrated Crypto Service Facility (ICSF) install data sets must be properly protected.
IBM RACF OPERAUDIT SETROPTS value must set to OPERAUDIT.
CA-TSS ADMINBY Control Option must be set to ADMINBY.
CA-TSS LOG Control Option must be set to (SMF,INIT, SEC9, MSG).
CA-TSS MSCA ACID password changes must be documented in the change log.
IBM z/OS required SMF data record types must be collected.
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
The system must be configured to audit Account Management - Security Group Management successes.
The system must be configured to audit Account Management - User Account Management failures.
The system must be configured to audit Account Management - User Account Management successes.
The system must be configured to audit Policy Change - Authentication Policy Change successes.
The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
The system must be configured to audit Privilege Use - Sensitive Privilege Use successes.
The system must be configured to audit System - Security State Change successes.
The system must be configured to audit System - Security System Extension successes.
The system must be configured to audit System - System Integrity failures.
The system must be configured to audit System - System Integrity successes.
Windows 10 must have command line process auditing events enabled for failures.
Windows 11 must have command line process auditing events enabled for failures.
Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2016 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2016 must be configured to audit System - IPsec Driver successes.
Windows Server 2016 must be configured to audit System - IPsec Driver failures.
Windows Server 2016 must be configured to audit System - Other System Events successes.
Windows Server 2016 must be configured to audit System - Other System Events failures.
Windows Server 2016 must be configured to audit System - Security State Change successes.
Windows Server 2016 must be configured to audit System - Security System Extension successes.
Windows Server 2016 must be configured to audit System - System Integrity successes.
Windows Server 2016 must be configured to audit System - System Integrity failures.
Active Directory Group Policy objects must be configured with proper audit settings.
The Active Directory Domain object must be configured with proper audit settings.
The Active Directory Infrastructure object must be configured with proper audit settings.
The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
The Active Directory AdminSDHolder object must be configured with proper audit settings.
The Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes.
Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2019 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2019 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2019 must be configured to audit System - IPsec Driver successes.
Windows Server 2019 must be configured to audit System - IPsec Driver failures.
Windows Server 2019 must be configured to audit System - Other System Events successes.
Windows Server 2019 must be configured to audit System - Other System Events failures.
Windows Server 2019 must be configured to audit System - Security State Change successes.
Windows Server 2019 must be configured to audit System - Security System Extension successes.
Windows Server 2019 must be configured to audit System - System Integrity successes.
Windows Server 2019 must be configured to audit System - System Integrity failures.
Windows Server 2019 Active Directory Group Policy objects must be configured with proper audit settings.
Windows Server 2019 Active Directory Domain object must be configured with proper audit settings.
Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Windows Server 2019 Active Directory AdminSDHolder object must be configured with proper audit settings.
Windows Server 2019 Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2019 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2019 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2019 must be configured to audit DS Access - Directory Service Changes successes.
Windows Server 2022 must be configured to audit Account Management - Other Account Management Events successes.
Windows Server 2022 must be configured to audit Detailed Tracking - Process Creation successes.
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change successes.
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change failures.
Windows Server 2022 must be configured to audit Policy Change - Authentication Policy Change successes.
Windows Server 2022 must be configured to audit Policy Change - Authorization Policy Change successes.
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Windows Server 2022 must be configured to audit System - IPsec Driver successes.
Windows Server 2022 must be configured to audit System - IPsec Driver failures.
Windows Server 2022 must be configured to audit System - Other System Events successes.
Windows Server 2022 must be configured to audit System - Other System Events failures.
Windows Server 2022 must be configured to audit System - Security State Change successes.
Windows Server 2022 must be configured to audit System - Security System Extension successes.
Windows Server 2022 must be configured to audit System - System Integrity successes.
Windows Server 2022 must be configured to audit System - System Integrity failures.
Windows Server 2022 Active Directory Group Policy objects must be configured with proper audit settings.
Windows Server 2022 Active Directory Domain object must be configured with proper audit settings.
Windows Server 2022 Active Directory Infrastructure object must be configured with proper audit settings.
Windows Server 2022 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Windows Server 2022 Active Directory AdminSDHolder object must be configured with proper audit settings.
Windows Server 2022 Active Directory RID Manager$ object must be configured with proper audit settings.
Windows Server 2022 must be configured to audit DS Access - Directory Service Access successes.
Windows Server 2022 must be configured to audit DS Access - Directory Service Access failures.
Windows Server 2022 must be configured to audit DS Access - Directory Service Changes successes.
The Oracle Linux operating system must audit all executions of privileged functions.
The OL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
OpenShift must enforce access restrictions and support auditing of the enforcement actions.
The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.
The SUSE operating system must generate audit records for all uses of the privileged functions.
RHEL 9 must audit uses of the "execve" system call.
The operating system must protect the audit records resulting from non-local accesses to privileged accounts and the execution of privileged functions.
The VMM must audit the execution of privileged functions.
The Photon operating system must audit the execution of privileged functions.
The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
The vCenter Lookup service must produce log records containing sufficient information regarding event details.
The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
BMC CONTROL-D installation data sets will be properly protected.
BMC CONTROL-D resources will be properly defined and protected.
BMC CONTROL-M/Restart installation data sets will be properly protected.
BMC CONTROL-O installation data sets will be properly protected.
BMC CONTROL-O resources must be properly defined and protected.
BMC IOA installation data sets will be properly protected.
BMC IOA resources will be properly defined and protected.
BMC MAINVIEW for z/OS installation data sets are not properly protected.
BMC MAINVIEW resources must be properly defined and protected.
CA Auditor resources are not properly defined and protected.
CA Common Services installation data sets will be properly protected.
Catalog Solution Install data sets are not properly protected.
Catalog Solutions resources must be properly defined and protected.
BMC CONTROL-M installation data sets will be properly protected.
BMC C0NTROL-M resources must be properly defined and protected.
BMC CONTROL-M/Restart installation data sets will be not properly protected.
The vCenter STS service must produce log records containing sufficient information regarding event details.
The vCenter UI service must produce log records containing sufficient information regarding event details.
CA 1 Tape Management installation data sets must be properly protected.
CA 1 Tape Management command resources must be properly defined and protected.
CA 1 Tape Management function and password resources must be properly defined and protected.
CA MICS Resource Management installation data sets must be properly protected.
CA MIM Resource Sharing installation data sets will be properly protected.
CA MIM Resource Sharing resources will be properly defined and protected.
BMC CONTROL-D resources must be properly defined and protected.
CL/SuperSession Install data sets must be properly protected.
Compuware Abend-AID installation data sets will be properly protected.
Compuware Abend-AID resources must be properly defined and protected.
Fast Dump Restore (FDR) install data sets are not properly protected.
IBM Hardware Configuration Definition (HCD) resources are not properly defined and protected.
IBM CICS Transaction Server SPI command resources must be properly defined and protected.
BMC IOA resources must be properly defined and protected.
IBM System Display and Search Facility (SDSF) installation data sets will be properly protected.
IBM System Display and Search Facility (SDSF) resources must be properly defined and protected.
IBM System Display and Search Facility (SDSF) resources will be properly defined and protected.
CA VTAPE installation data sets are not properly protected.
Quest NC-Pass installation data sets will be properly protected.
Quest NC-Pass will be used by Highly-Sensitive users.
Transparent Data Migration Facility (TDMF) installation data sets will be not properly protected.
HFS objects for the WebSphere Application Server are not protected in accordance with the proper security requirements.
WebSphere MQ all update and alter access to MQSeries/WebSphere MQ product and system data sets are not properly restricted.
WebSphere MQ MQCONN Class resources must be protected in accordance with security.
WebSphere MQ command resources defined to MQCMDS resource class are not protected in accordance with security requirements.
NetView install data sets are not properly protected.
NetView resources must be properly defined and protected.
Catalog Solutions Install data sets are not properly protected.
Catalog Solutions resources must be properly defined and protected.
SRRAUDIT installation data sets must be properly protected.
ROSCOE Install data sets are not properly protected.
ROSCOE resources must be properly defined and protected.
Tivoli Asset Discovery for z/OS (TADz) Install data sets are not properly protected.
CA MICS Resource Management User data sets must be properly protected.
Vanguard Security Solutions resources must be properly defined and protected.
WebSphere MQ MQCONN Class (Connection) resource definitions must be protected in accordance with security.
WebSphere MQ MQCONN Class resources must be protected properly.
Ubuntu 22.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
The zSecure programs CKFCOLL and CKGRACF, and the APF-authorized version of program CKRCARLA, must be restricted to security administrators, security batch jobs performing External Security Manager (ESM) maintenance, auditors, and systems programmers, and audited.
Audit logging must be enabled on MKE.
SLEM 5 must generate audit records for all uses of privileged functions.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
The TOSS audit system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.