Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002130
CCI
CCI|CCI-002130
Title
Automatically audit account enabling actions.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
1.34 APPL-14-001003
Unix
CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT II
1.41 UBTU-24-200280
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.42 UBTU-24-200290
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.43 UBTU-24-200300
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.44 UBTU-24-200310
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.45 UBTU-24-200320
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.157 UBTU-22-654130
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.158 UBTU-22-654135
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.159 UBTU-22-654140
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.160 UBTU-22-654145
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.161 UBTU-22-654150
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.222 OL08-00-030130
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.223 OL08-00-030140
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.224 OL08-00-030150
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.225 OL08-00-030160
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.226 OL08-00-030170
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.227 OL08-00-030171
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.228 OL08-00-030172
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.433 RHEL-09-654215
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.434 RHEL-09-654220
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.435 RHEL-09-654225
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.436 RHEL-09-654230
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.437 RHEL-09-654235
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.438 RHEL-09-654240
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.439 RHEL-09-654245
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
4.1.3.14 Ensure events that modify user/group information are collected - group
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.14 Ensure events that modify user/group information are collected - gshadow
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.14 Ensure events that modify user/group information are collected - opasswd
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.14 Ensure events that modify user/group information are collected - passwd
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.14 Ensure events that modify user/group information are collected - shadow
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-002016 - AIX must provide audit record generation functionality for DoD-defined auditable events.
Unix
DISA STIG AIX 7.x v3r1
ALMA-09-004970 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-005080 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-005190 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-005300 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-005410 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-005960 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
ALMA-09-006070 - AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect the files within /etc/sudoers.d/
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r3
AOSX-15-001003 - The macOS system must initiate session audits at system startup
Unix
DISA STIG Apple Mac OSX 10.15 v1r10
APPL-13-001003 - The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
Unix
DISA STIG Apple macOS 13 v1r5
APPL-14-001003 - The macOS system must enable security auditing.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r3
APPL-15-001001 - The macOS system must be configured to audit all administrative action events.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r4
ARST-ND-000150 - The Arista network device must be configured to audit all administrator activity.
Arista
DISA STIG Arista MLS EOS 4.2x NDM v2r1
ARST-ND-000150 - The Arista network device must be configured to audit all administrator activity.
Arista
DISA STIG Arista MLS EOS 4.x NDM v2r2
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - All Profiles