DB2X-00-000700 - DB2 must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - DBAUTH | DISA STIG IBM DB2 v10.5 LUW v1r4 Database | IBM_DB2DB | AUDIT AND ACCOUNTABILITY |
EP11-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. - data\* | EDB PostgreSQL Advanced Server v11 Windows OS Audit v1r1 | Windows | CONFIGURATION MANAGEMENT |
EPAS-00-001100 - The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred. | DISA STIG VMware vSphere 6.7 ESXi v1r2 | VMware | |
JBOS-AS-000085 - JBoss must be configured to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which loggable events are to be logged. | DISA RedHat JBoss EAP 6.3 STIG v1r4 | Unix | AUDIT AND ACCOUNTABILITY |
MADB-10-000600 - MariaDB must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA MariaDB Enterprise 10.x v1r3 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
MADB-10-000600 - MariaDB must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. - mysql.tables_priv | DISA MariaDB Enterprise 10.x v1r2 DB | MySQLDB | |
MYS8-00-001700 - The MySQL Database Server 8.0 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited | DISA Oracle Linux 8 STIG v1r7 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Oracle Linux 8 STIG v1r2 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Oracle Linux 8 STIG v1r6 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/rules.d/*.rules | DISA Oracle Linux 8 STIG v1r2 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/rules.d/*.rules | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/rules.d/*.rules | DISA Oracle Linux 8 STIG v1r6 | Unix | |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA Oracle Linux 8 STIG v1r10 | Unix | AUDIT AND ACCOUNTABILITY |
OL08-00-030610 - OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. - /etc/audit/rules.d/*.rules | DISA Oracle Linux 8 STIG v1r1 | Unix | |
PHTN-67-000019 - The Photon operating system must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA STIG VMware vSphere 6.7 Photon OS v1r1 | Unix | |
PHTN-67-000019 - The Photon operating system must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | AUDIT AND ACCOUNTABILITY |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Red Hat Enterprise Linux 8 STIG v1r5 | Unix | |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/auditd.conf | DISA Red Hat Enterprise Linux 8 STIG v1r7 | Unix | |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - /etc/audit/rules.d/*.rules | DISA Red Hat Enterprise Linux 8 STIG v1r3 | Unix | |
RHEL-08-030610 - RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. - /etc/audit/rules.d/*.rules | DISA Red Hat Enterprise Linux 8 STIG v1r1 | Unix | |
SPLK-CL-000140 - Splunk Enterprise must allow only the individuals appointed by the Information System Security Manager (ISSM) to have full admin rights to the system. | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG REST API | Splunk | |
SPLK-CL-000140 - Splunk Enterprise must allow only the individuals appointed by the Information System Security Manager (ISSM) to have full admin rights to the system. | DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG REST API | Splunk | |
SQL4-00-011320 - Where SQL Server Audit is in use at the database level, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the database level. | DISA STIG SQL Server 2014 Database Audit v1r6 | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
UBTU-20-010133 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - audit.rules | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010133 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.conf | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010133 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.conf | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010133 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/* | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
UBTU-20-010133 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/* | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010134 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - audit.rules | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010134 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010134 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | AUDIT AND ACCOUNTABILITY |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rules | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rules | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rules | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010135 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
UBTU-22-653065 - Ubuntu 22.04 LTS must be configured so that audit configuration files are not write-accessible by unauthorized users. | DISA STIG Canonical Ubuntu 22.04 LTS v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
UBTU-22-653075 - Ubuntu 22.04 LTS must permit only authorized groups to own the audit configuration files. | DISA STIG Canonical Ubuntu 22.04 LTS v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
VCPG-67-000003 - VMware Postgres configuration files must not be accessible by unauthorized users. | DISA STIG VMware vSphere 6.7 PostgreSQL v1r1 | Unix | |
WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - permissions | DISA Microsoft Windows 2012 Server DNS STIG v1r14 | Windows | AUDIT AND ACCOUNTABILITY |
WN11-UR-000130 - The 'Manage auditing and security log' user right must only be assigned to the Administrators group - Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows 11 STIG v1r4 | Windows | |
WN11-UR-000130 - The 'Manage auditing and security log' user right must only be assigned to the Administrators group - Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows 11 STIG v1r2 | Windows | |
WN11-UR-000130 - The 'Manage auditing and security log' user right must only be assigned to the Administrators group - Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows 11 STIG v1r5 | Windows | |
WN11-UR-000130 - The 'Manage auditing and security log' user right must only be assigned to the Administrators group. | DISA Windows 11 STIG v1r1 | Windows | |