This audit has been deprecated and will be removed in a future update.
View Next Audit VersionCategory: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION
References: 800-53|AC-2(1), 800-53|CM-7, 800-53|IA-2, 800-53|IA-2(12), 800-53|IA-5(1), 800-53|IA-5(2), 800-53|IA-8(1), 800-53|IA-8(2), 800-53|IA-8(4), CAT|II, CCI|CCI-000015, CCI|CCI-000381, CCI|CCI-000764, CCI|CCI-001953, CCI|CCI-001954, CCI|CCI-001991, CCI|CCI-002010, CCI|CCI-002011, CCI|CCI-002014, CCI|CCI-002041, Rule-ID|SV-235780r627467_rule, STIG-ID|DKER-EE-001100, STIG-Legacy|SV-104703, STIG-Legacy|V-95113, Vuln-ID|V-235780
Plugin: Unix
Control ID: 141c79e4d24806eb99afcd4bc1155e80cb713d72a2635bcb96acf6a0c355bccd