800-53|AC-17(1)

Title

AUTOMATED MONITORING / CONTROL

Description

The information system monitors and controls remote access methods.

Supplemental

Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).

Reference Item Details

Related: AU-12,AU-2

Category: ACCESS CONTROL

Parent Title: REMOTE ACCESS

Family: ACCESS CONTROL

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
2.1.1.1.5 Set maximimum value for 'ip ssh authentication-retries'CiscoCIS Cisco IOS 16 L1 v1.1.2
3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.UnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.117 - Users must be prevented from connecting using Terminal Services.WindowsDISA Windows Vista STIG v6r41
AIX7-00-001024 - SSH must display the date and time of the last successful account login to AIX system upon login.UnixDISA STIG AIX 7.x v2r5
AIX7-00-001137 - AIX must be able to control the ability of remote login for users.UnixDISA STIG AIX 7.x v2r5
AIX7-00-002100 - AIX must monitor and record successful remote logins.UnixDISA STIG AIX 7.x v2r5
AIX7-00-002101 - AIX must monitor and record unsuccessful remote logins.UnixDISA STIG AIX 7.x v2r5
AOSX-13-000030 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.15 v1r8
APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 11 v1r5
APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 11 v1r6
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Site v2r2
AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Site v2r2 Middleware
AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.WindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W2-000670 - The Apache web server must restrict inbound connections from nonsecure zones.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Control remote access methodsUnixNIST macOS Big Sur v1.4.0 - All Profiles
CASA-FW-000030 - The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules - VPN Group PolicyCiscoDISA STIG Cisco ASA FW v1r2
CASA-FW-000030 - The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules - VPN RulesCiscoDISA STIG Cisco ASA FW v1r2
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r5 Moderate
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-171
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Catalina v1.5.0 - All Profiles
Catalina - Control remote access methodsUnixNIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-001080 - The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.UnixDISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r1
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker pathsUnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker servicesUnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
ESXI-06-000004 - Remote logging for ESXi hosts must be configured.VMwareDISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-06-200035 - The VMM must provide the capability to immediately disconnect or disable remote access to the information system by disabling SSH.VMwareDISA STIG VMware vSphere 6.x ESXi v1r5
ESXI-65-000004 - Remote logging for ESXi hosts must be configured.VMwareDISA STIG VMware vSphere ESXi 6.5 v2r3
ESXI-67-000004 - Remote logging for ESXi hosts must be configured.VMwareDISA STIG VMware vSphere 6.7 ESXi v1r2
ESXI-67-000035 - The ESXi host must be configured to disable nonessential capabilities by disabling SSH.VMwareDISA STIG VMware vSphere 6.7 ESXi v1r2
F5BI-AP-000153 - The BIG-IP APM module access policy profile must control remote access methods to virtual servers.F5DISA F5 BIG-IP Access Policy Manager 11.x STIG v2r1
F5BI-AS-000031 - The BIG-IP ASM module supporting intermediary services for remote access communications traffic must ensure inbound traffic is monitored for compliance with remote access security policies.F5DISA F5 BIG-IP Application Security Manager 11.x STIG v1r1