This audit has been deprecated and will be removed in a future update.
View Next Audit VersionCategory: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY
References: 800-53|AC-6(9), 800-53|AC-17(1), 800-53|AU-3, 800-53|AU-3(1), 800-53|AU-4(1), 800-53|AU-12, 800-53|AU-14, 800-53|CM-5(1), 800-53|SI-7(8), 800-53|SI-10(3), CAT|II, CCI|CCI-000067, CCI|CCI-000130, CCI|CCI-000131, CCI|CCI-000132, CCI|CCI-000133, CCI|CCI-000134, CCI|CCI-000135, CCI|CCI-000169, CCI|CCI-000172, CCI|CCI-001462, CCI|CCI-001464, CCI|CCI-001487, CCI|CCI-001814, CCI|CCI-001851, CCI|CCI-002234, CCI|CCI-002723, CCI|CCI-002754, Rule-ID|SV-235778r627461_rule, STIG-ID|DKER-EE-001080, STIG-Legacy|SV-104699, STIG-Legacy|V-94869, Vuln-ID|V-235778
Plugin: Unix
Control ID: 630c1a24e2798f2e95dcd7c736537c83b7326703e342bc2b4994a72279b4489c