CCI|CCI-001496

Title

The information system implements cryptographic mechanisms to protect the integrity of audit tools.

Reference Item Details

Category: 2009

Audit Items

View all Reference Audit Items

NamePluginAudit Name
6.1.15 Ensure the file permissions ownership and group membership of system files and commands match the vendor valuesUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-002028 - AIX must verify the hash of audit tools.UnixDISA STIG AIX 7.x v2r9
Big Sur - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Catalina - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Catalina v1.5.0 - All Profiles
ESXI-70-000095 - The ESXi host must implement Secure Boot enforcement.UnixDISA STIG VMware vSphere 7.0 ESXi OS v1r2
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configUnixDISA STIG Solaris 10 X86 v2r4
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configUnixDISA STIG Solaris 10 SPARC v2r4
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - usedUnixDISA STIG Solaris 10 SPARC v2r4
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - usedUnixDISA STIG Solaris 10 X86 v2r4
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.UnixDISA STIG for Oracle Linux 5 v2r1
Monterey - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Monterey v1.0.0 - All Profiles
Monterey - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Monterey v1.0.0 - 800-53r4 High
Monterey - Protect Audit Integrity with Cryptographic MechanismsUnixNIST macOS Monterey v1.0.0 - 800-53r5 High
OL6-00-000281 - The system package management tool must verify contents of all files associated with the audit package.UnixDISA STIG Oracle Linux 6 v2r7
OL07-00-010010 - The Oracle Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.UnixDISA Oracle Linux 7 STIG v2r14
OL08-00-030650 - OL 8 must use cryptographic mechanisms to protect the integrity of audit tools.UnixDISA Oracle Linux 8 STIG v1r8
PHTN-30-000051 - The Photon operating system package files must not be modified.UnixDISA STIG VMware vSphere 7.0 Photon OS v1r2
PHTN-67-000053 - The Photon operating system package files must not be modified.UnixDISA STIG VMware vSphere 6.7 Photon OS v1r6
RHEL-06-000281 - The system package management tool must verify contents of all files associated with the audit package.UnixDISA Red Hat Enterprise Linux 6 STIG v2r2
RHEL-07-010010 - The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.UnixDISA Red Hat Enterprise Linux 7 STIG v3r14
RHEL-08-030650 - RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.UnixDISA Red Hat Enterprise Linux 8 STIG v1r13
SLES-12-010540 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.UnixDISA SLES 12 STIG v2r13
SLES-15-030630 - The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.UnixDISA SLES 15 STIG v1r12
SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.UnixDISA STIG Solaris 11 X86 v2r9
SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.UnixDISA STIG Solaris 11 SPARC v2r9
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - audispdUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditctlUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - auditdUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - augenrulesUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - aureportUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - ausearchUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-010550 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools - autraceUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-18-010506 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.UnixDISA STIG Ubuntu 18.04 LTS v2r13
UBTU-20-010205 - The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.UnixDISA STIG Ubuntu 20.04 LTS v1r10