CCI|CCI-000134

Title

The information system generates audit records containing information that establishes the outcome of the event.

Reference Item Details

Category: 2009

Audit Items

View all Reference Audit Items

NamePluginAudit Name
AIX7-00-002005 - AIX must produce audit records containing information to establish the outcome of the events.UnixDISA STIG AIX 7.x v2r6
APPL-12-001003 - The macOS system must initiate session audits at system startupUnixDISA STIG Apple macOS 12 v1r4
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - log_config_moduleUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - log_config_moduleUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - LogFormatUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - LogFormatUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-W1-000090 - The Apache web server must produce log records containing sufficient information to establish what type of events occurred.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000090 - The Apache web server must produce log records containing sufficient information to establish what type of events occurred.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Enable Security AuditingUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
CASA-ND-000300 - The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event - buffered informationalCiscoDISA STIG Cisco ASA NDM v1r1
CASA-ND-000300 - The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event - logging enableCiscoDISA STIG Cisco ASA NDM v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - svcCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - vpnCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - vpncCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - vpnfoCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - webfoCiscoDISA STIG Cisco ASA VPN v1r1
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events - webvpnCiscoDISA STIG Cisco ASA VPN v1r1
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r5 Moderate
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-171
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - All Profiles
Catalina - Enable Security AuditingUnixNIST macOS Catalina v1.5.0 - 800-53r4 Low
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.CiscoDISA STIG Cisco IOS-XR Router RTR v2r1
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.CiscoDISA STIG Cisco IOS XE Router RTR v2r4
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via an ACL.CiscoDISA STIG Cisco IOS Router RTR v2r1
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an access control list (ACL).CiscoDISA STIG Cisco IOS Switch RTR v2r2
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an ACL - ACL.CiscoDISA STIG Cisco IOS XE Switch RTR v2r2
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an ACL.CiscoDISA STIG Cisco NX-OS Switch RTR v2r1
CNTR-K8-000700 - Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.UnixDISA STIG Kubernetes v1r6
DKER-EE-001080 - The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.UnixDISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r1
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker pathsUnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker servicesUnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
FNFG-FW-000040 - The FortiGate firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.FortiGateDISA Fortigate Firewall STIG v1r3
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure'UnixDISA STIG for Oracle Linux 5 v2r1
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'UnixDISA STIG for Oracle Linux 5 v2r1
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_type'UnixDISA STIG for Oracle Linux 5 v2r1
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_failure'UnixDISA STIG for Oracle Linux 5 v2r1
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_success'UnixDISA STIG for Oracle Linux 5 v2r1