2.2 Ensure That Sinks Are Configured for All Log Entries | CIS Google Cloud Platform v3.0.0 L1 | GCP | AUDIT AND ACCOUNTABILITY |
2.3.2.1 (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' | CIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker | Windows | AUDIT AND ACCOUNTABILITY |
3.8 Logging should be enable for all Firewall Rules | CIS Check Point Firewall L2 v1.1.0 | CheckPoint | AUDIT AND ACCOUNTABILITY, SECURITY ASSESSMENT AND AUTHORIZATION |
4.1.1.2 Ensure auditd service is enabled and running - enabled | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure auditd service is enabled and running - running | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - action_mail_acct | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - action_mail_acct | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - admin_space_left_action | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - admin_space_left_action | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - space_left_action | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure system is disabled when audit logs are full - space_left_action | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full | CIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full | CIS SUSE Linux Enterprise 15 Server L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.3 Ensure system is disabled when audit logs are full | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS SUSE Linux Enterprise 15 Server L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.4 Ensure audit_backlog_limit is sufficient | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.5 Ensure system is disabled when audit logs are full - 'action_mail_acct = root' | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.5 Ensure system is disabled when audit logs are full - 'admin_space_left_action = halt' | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.5 Ensure system is disabled when audit logs are full - 'space_left_action = email' | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.7 Ensure audit_backlog_limit is sufficient | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.7 Ensure audit_backlog_limit is sufficient | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.3.20 Ensure the audit configuration is immutable | CIS CentOS Linux 8 Server L2 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3.20 Ensure the audit configuration is immutable | CIS CentOS Linux 8 Workstation L2 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3.41 Ensure the audit configuration is immutable | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3.41 Ensure the audit configuration is immutable | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.6 Ensure events that modify the system's network environment are collected - /etc/issue | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.13 Ensure file deletion events by users are collected | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.17 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.17 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Server | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.17 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise 15 Server L2 v1.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.17 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise 12 v3.2.0 L2 Workstation | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.18 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.18 Ensure the audit configuration is immutable | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.1.4 Ensure logging is configured | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
5.2.1.1 Ensure auditd is installed | CIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.2.1.1 Ensure auditd is installed | CIS Ubuntu Linux 20.04 LTS Workstation L2 v2.0.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire' | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
6.2.3.13 Ensure file deletion events by users are collected | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.2.3.19 Ensure kernel module loading unloading and modification is collected | CIS Ubuntu Linux 24.04 LTS v1.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Referer | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |