AIX7-00-002200 - The AIX audit configuration files must be owned by root. | DISA STIG AIX 7.x v2r3 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002201 - The AIX audit configuration files must be group-owned by audit. | DISA STIG AIX 7.x v2r3 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002201 - The AIX audit configuration files must be group-owned by audit. | DISA STIG AIX 7.x v2r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002202 - The AIX audit configuration files must be set to 640 or less permissive. | DISA STIG AIX 7.x v2r1 | Unix | CONFIGURATION MANAGEMENT |
AIX7-00-002202 - The AIX audit configuration files must be set to 640 or less permissive. | DISA STIG AIX 7.x v2r3 | Unix | CONFIGURATION MANAGEMENT |
APPL-14-001110 - The macOS system must configure audit_control group to wheel. | DISA Apple macOS 14 (Sonoma) STIG v1r2 | Unix | |
APPL-14-001120 - The macOS system must configure audit_control owner to root. | DISA Apple macOS 14 (Sonoma) STIG v1r2 | Unix | |
APPL-14-001130 - The macOS system must configure audit_control to mode 440 or less permissive. | DISA Apple macOS 14 (Sonoma) STIG v1r2 | Unix | |
APPL-14-001140 - The macOS system must configure audit_control to not contain access control lists. | DISA Apple macOS 14 (Sonoma) STIG v1r2 | Unix | |
ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred. | DISA STIG VMware vSphere 6.7 ESXi v1r1 | VMware | AUDIT AND ACCOUNTABILITY |
JUSX-DM-000019 - For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created. | DISA Juniper SRX Services Gateway NDM v3r1 | Juniper | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Config | DISA STIG PostgreSQL 9.x on RHEL OS v2r2 | Unix | CONFIGURATION MANAGEMENT |
PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Data | DISA STIG PostgreSQL 9.x on RHEL DB v2r1 | Unix | CONFIGURATION MANAGEMENT |
PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Data | DISA STIG PostgreSQL 9.x on RHEL OS v2r2 | Unix | CONFIGURATION MANAGEMENT |
PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Roles | DISA STIG PostgreSQL 9.x on RHEL DB v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Roles | DISA STIG PostgreSQL 9.x on RHEL OS v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
SPLK-CL-000270 - Splunk Enterprise must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to be assigned to the Power User role - or individuals or roles appointed by the ISSM to be assigned to the Power User role. | DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST API | Splunk | AUDIT AND ACCOUNTABILITY |
UBTU-16-020150 - The Ubuntu operating system must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - audit.rules | DISA STIG Ubuntu 16.04 LTS v2r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rules | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - auditd.conf | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r2 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/* | DISA STIG Ubuntu 18.04 LTS v2r4 | Unix | CONFIGURATION MANAGEMENT |
WBSP-AS-000090 - The WebSphere Application Server users WebSphere auditor role must be configured in accordance with System Security Plan. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - manage | DISA Microsoft Windows 2012 Server DNS STIG v2r4 | Windows | ACCESS CONTROL |
WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - manage | DISA Microsoft Windows 2012 Server DNS STIG v2r1 | Windows | ACCESS CONTROL |
WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - permissions | DISA Microsoft Windows 2012 Server DNS STIG v2r1 | Windows | AUDIT AND ACCOUNTABILITY |
WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - permissions | DISA Microsoft Windows 2012 Server DNS STIG v2r4 | Windows | AUDIT AND ACCOUNTABILITY |
WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | ACCESS CONTROL |
WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | ACCESS CONTROL |
WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right. | DISA Windows 7 STIG v1r32 | Windows | ACCESS CONTROL |
WN08-UR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right. | DISA Windows 8/8.1 STIG v1r23 | Windows | ACCESS CONTROL |
WN10-UR-000130 - The Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v2r4 | Windows | |
WN10-UR-000130 - The Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v2r7 | Windows | |
WN12-UR-000032 - The Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r6 | Windows | |
WN16-UR-000260 - The Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN16-UR-000260 - The Manage auditing and security log user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r4 | Windows | |