Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002234
CCI
CCI|CCI-002234
Title
Log the execution of privileged functions.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
1.46 UBTU-24-200580
Unix
CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.177 UBTU-22-654230
Unix
CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.205 OL08-00-030000
Unix
CIS Oracle Linux 8 STIG v1.0.0 CAT II
1.392 RHEL-09-654010
Unix
CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
4.1.3.32 Ensure auditing of all privileged functions - setgid 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.32 Ensure auditing of all privileged functions - setgid 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.32 Ensure auditing of all privileged functions - setuid 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.32 Ensure auditing of all privileged functions - setuid 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-002016 - AIX must provide audit record generation functionality for DoD-defined auditable events.
Unix
DISA STIG AIX 7.x v3r1
ALMA-09-007280 - AlmaLinux OS 9 must audit uses of the "execve" system call.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-031920 - AlmaLinux OS 9 must require users to provide authentication for privilege escalation.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-032030 - AlmaLinux OS 9 must require users to provide a password for privilege escalation.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-032140 - AlmaLinux OS 9 must not be configured to bypass password requirements for privilege escalation.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r2
ALMA-09-032250 - AlmaLinux OS 9 must require reauthentication when using the "sudo" command.
Unix
DISA CloudLinux AlmaLinux OS 9 STIG v1r2
APPL-14-001001 - The macOS system must be configured to audit all administrative action events.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r3
APPL-15-001001 - The macOS system must be configured to audit all administrative action events.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r4
ARST-ND-000150 - The Arista network device must be configured to audit all administrator activity.
Arista
DISA STIG Arista MLS EOS 4.2x NDM v2r1
ARST-ND-000150 - The Arista network device must be configured to audit all administrator activity.
Arista
DISA STIG Arista MLS EOS 4.x NDM v2r2
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
CASA-ND-000910 - The Cisco ASA must be configured to audit the execution of privileged functions.
Cisco
DISA STIG Cisco ASA NDM v2r2
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Configure System to Audit All Administrative Action Events
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Moderate
CISC-ND-000210 - The Cisco device must be configured to audit all administrator activity.
Cisco
DISA Cisco IOS Router NDM STIG v3r4
CISC-ND-000210 - The Cisco device must be configured to audit all administrator activity.
Cisco
DISA Cisco IOS Switch NDM STIG v3r5
CISC-ND-000210 - The Cisco device must be configured to audit all administrator activity.
Cisco
DISA Cisco IOS XE Switch NDM STIG v3r4
CISC-ND-000210 - The Cisco device must be configured to audit all administrator activity.
Cisco
DISA Cisco IOS XE Router NDM STIG v3r5
CISC-ND-000940 - The Cisco switch must be configured to audit the execution of privileged functions.
Cisco
DISA Cisco NX OS Switch NDM STIG v3r3
CNTR-R2-000060 - Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Unix
DISA Rancher Government Solutions RKE2 STIG v2r3
DKER-EE-001080 - The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker paths
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker services
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
DKER-EE-003230 - An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
FGFW-ND-000040 - The FortiGate device must audit the execution of privileged functions
FortiGate
DISA Fortigate Firewall NDM STIG v1r4
GEN002820-9 - The audit system must be configured to audit all discretionary access control permission modifications - 'lsetxattr'
Unix
DISA STIG for Oracle Linux 5 v2r1
GEN002820-9 - The audit system must be configured to audit all discretionary access control permission modifications - 'lsetxattr'
Unix
DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit