Item Search

NameAudit NamePluginCategory
2.1.10 (L1) Ensure DMARC Records for all Exchange Online domains are publishedCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.2 Ensure auditd is installedCIS Distribution Independent Linux Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.7 Review suspend audit configuration when device is fullCIS Sybase 15.0 L2 DB v1.1.0SybaseDB
5.2.2.3 Ensure system is disabled when audit logs are fullCIS Oracle Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.2.3 Ensure system is disabled when audit logs are fullCIS Red Hat EL8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.5 Ensure audit configuration files are 640 or more restrictiveCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Amazon Linux 2023 Server L2 v1.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Debian 10 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.6 Ensure audit configuration files are owned by rootCIS Rocky Linux 8 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.7 Ensure audit configuration files belong to group rootCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.2.3 Ensure system is disabled when audit logs are fullCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.4.5 Ensure audit configuration files mode is configuredCIS Debian Linux 12 v1.1.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.7 Ensure audit configuration files group owner is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.2.3 Ensure system is disabled when audit logs are fullCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.2.3 Ensure system is disabled when audit logs are fullCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.2.3 Ensure system is disabled when audit logs are fullCIS SUSE Linux Enterprise 15 v2.0.1 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.4.5 Ensure audit configuration files mode is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.5 Ensure audit configuration files mode is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.6 Ensure audit configuration files owner is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.6 Ensure audit configuration files owner is configuredCIS AlmaLinux OS 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.6 Ensure audit configuration files owner is configuredCIS Oracle Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.7 Ensure audit configuration files group owner is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.7 Ensure audit configuration files group owner is configuredCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.7 Ensure audit configuration files group owner is configuredCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.5 Ensure audit configuration files mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.7 Ensure audit configuration files group owner is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

AIX7-00-002001 - AIX must produce audit records containing information to establish what the date, time, and type of events that occurred.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002004 - AIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002005 - AIX must produce audit records containing information to establish the outcome of the events.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AIX7-00-002006 - AIX must produce audit records containing the full-text recording of privileged commands.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

DB2X-00-001000 - DB2 must initiate session auditing upon startup - Review user policiesDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

AUDIT AND ACCOUNTABILITY

DB2X-00-001000 - DB2 must initiate session auditing upon startup - VALIDATEDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

AUDIT AND ACCOUNTABILITY

F5BI-DM-000067 - The BIG-IP appliance must be configured to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.DISA F5 BIG-IP Device Management STIG v2r4F5

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FNFG-FW-000060 - The FortiGate firewall must protect the traffic log from unauthorized deletion of local log files and log records.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

GEN002700 - System audit logs must have mode 0640 or less permissive.DISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002750 - The audit system must be configured to audit account creation - 'User audit class assignments should be reviewed'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

SQL4-00-013000 - Unless it has been determined that availability is paramount, SQL Server must shut down upon the failure of an Audit, or a Trace used for auditing purposes, to include the unavailability of space for more audit/trace log records.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

WBLC-02-000086 - Oracle WebLogic must notify administrative personnel as a group in the event of audit processing failure - SMTP NotificationOracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

AUDIT AND ACCOUNTABILITY