800-53|AC-17(1)

Title

AUTOMATED MONITORING / CONTROL

Description

The information system monitors and controls remote access methods.

Supplemental

Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).

Reference Item Details

Related: AU-12,AU-2

Category: ACCESS CONTROL

Parent Title: REMOTE ACCESS

Family: ACCESS CONTROL

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
2.1.1.1.5 Set maximum value for 'ip ssh authentication-retries'CiscoCIS Cisco IOS 16 L1 v2.0.0
2.1.1.1.5 Set maximum value for 'ip ssh authentication-retries'CiscoCIS Cisco IOS 17 L1 v2.0.0
2.7 Ensure TLS authentication for Docker daemon is configured - tlscacertUnixCIS Docker v1.6.0 L1 Docker Linux
2.7 Ensure TLS authentication for Docker daemon is configured - tlscertUnixCIS Docker v1.6.0 L1 Docker Linux
2.7 Ensure TLS authentication for Docker daemon is configured - tlskeyUnixCIS Docker v1.6.0 L1 Docker Linux
2.7 Ensure TLS authentication for Docker daemon is configured - tlsverifyUnixCIS Docker v1.6.0 L1 Docker Linux
2.8.1 Ensure 'Allow remote access connections to this machine' is set to 'Disabled'WindowsCIS Google Chrome L1 v2.1.0
2.8.2 Ensure 'Allow remote users to interact with elevated windows in remote assistance sessions' is set to 'Disabled'WindowsCIS Google Chrome L1 v2.1.0
2.8.3 Ensure 'Configure the required domain names for remote access clients' is set to 'Enabled' with a domain definedWindowsCIS Google Chrome L1 v2.1.0
2.8.4 Ensure 'Enable curtaining of remote access hosts' is set to 'Disabled'WindowsCIS Google Chrome L1 v2.1.0
2.8.5 Ensure 'Enable firewall traversal from remote access host' is set to 'Disabled'WindowsCIS Google Chrome L1 v2.1.0
2.8.6 Ensure 'Enable or disable PIN-less authentication for remote access hosts' is set to 'Disabled'WindowsCIS Google Chrome L1 v2.1.0
2.8.7 Ensure 'Enable the use of relay servers by the remote access host' is set to 'Disabled'.WindowsCIS Google Chrome L1 v2.1.0
3.2 Ensure 'Allow unmanaged devices' is set to 'False'WindowsCIS Microsoft Exchange Server 2019 L1 MDM v1.0.0
3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.UnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
3.9 Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account Accessmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
3.9 Ensure 'Require encryption on device' is set to 'True'WindowsCIS Microsoft Exchange Server 2019 L1 MDM v1.0.0
5.1.1 Enable Compromised Host QuarantineFortiGateCIS Fortigate 7.0.x Level 1 v1.2.0
5.117 - Users must be prevented from connecting using Terminal Services.WindowsDISA Windows Vista STIG v6r41
AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.MDMAirWatch - DISA Apple iOS 12 v2r1
AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.MDMMobileIron - DISA Apple iOS 12 v2r1
AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MDMAirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MDMMobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MDMMobileIron - DISA Apple iOS/iPadOS 14 v1r3
AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MDMAirWatch - DISA Apple iOS/iPadOS 14 v1r3
AIX7-00-001137 - AIX must be able to control the ability of remote login for users.UnixDISA STIG AIX 7.x v2r9
AIX7-00-002100 - AIX must monitor and record successful remote logins.UnixDISA STIG AIX 7.x v2r9
AIX7-00-002101 - AIX must monitor and record unsuccessful remote logins.UnixDISA STIG AIX 7.x v2r9
AOSX-13-000030 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple Mac OSX 10.15 v1r10
APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 11 v1r8
APPL-11-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 11 v1r5
APPL-12-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 12 v1r7
APPL-13-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.UnixDISA STIG Apple macOS 13 v1r3
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Server v2r6 Middleware
AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.UnixDISA STIG Apache Server 2.4 Unix Server v2r6
AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000670 - The Apache web server must restrict inbound connections from nonsecure zones.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Configure System to Audit All Log In and Log Out EventsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Control remote access methodsUnixNIST macOS Big Sur v1.4.0 - All Profiles
CASA-FW-000030 - The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules - VPN Group PolicyCiscoDISA STIG Cisco ASA FW v1r4