Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000134
CCI
CCI|CCI-000134
Title
Ensure that audit records containing information that establishes the outcome of the event.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AIX7-00-002005 - AIX must produce audit records containing information to establish the outcome of the events.
Unix
DISA STIG AIX 7.x v3r1
AOSX-15-001003 - The macOS system must initiate session audits at system startup
Unix
DISA STIG Apple Mac OSX 10.15 v1r10
APPL-13-001003 - The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
Unix
DISA STIG Apple macOS 13 v1r4
APPL-14-001003 - The macOS system must enable security auditing.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-15-001003 - The macOS system must enable security auditing.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
ARST-ND-000790 - The Arista network device must be configured to capture all DOD auditable events.
Arista
DISA STIG Arista MLS EOS 4.2x NDM v2r1
ARST-RT-000230 - The Arista router must be configured to produce audit records containing information to establish where the events occurred.
Arista
DISA STIG Arista MLS EOS 4.2x Router v2r1
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - log_config_module
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events - LogFormat
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000070 - The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-W1-000090 - The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000090 - The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000090 - The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
CASA-ND-000300 - The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event.
Cisco
DISA STIG Cisco ASA NDM v2r2
CASA-VN-000530 - The Cisco ASA remote access VPN server must be configured to produce log records containing information to establish the outcome of the events.
Cisco
DISA STIG Cisco ASA VPN v2r2
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Moderate
CD12-00-000200 - PostgreSQL must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
PostgreSQLDB
DISA STIG Crunchy Data PostgreSQL DB v3r1
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.
Cisco
DISA STIG Cisco IOS XE Router RTR v3r2
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.
Cisco
DISA STIG Cisco IOS-XR Router RTR v3r2
CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via an ACL.
Cisco
DISA STIG Cisco IOS Router RTR v3r2
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an access control list (ACL).
Cisco
DISA STIG Cisco IOS Switch RTR v3r1
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an ACL.
Cisco
DISA STIG Cisco NX-OS Switch RTR v3r2
CISC-RT-000200 - The Cisco switch must be configured to log all packets that have been dropped at interfaces via an ACL.
Cisco
DISA STIG Cisco IOS XE Switch RTR v3r1
CNTR-K8-000700 - Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
Unix
DISA STIG Kubernetes v2r2
CNTR-R2-000060 Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Unix
DISA Rancher Government Solutions RKE2 STIG v2r2
DB2X-00-001600 - DB2 must produce audit records containing sufficient information to establish the outcome (success or failure) of the events
IBM_DB2DB
DISA STIG IBM DB2 v10.5 LUW v2r1 Database
DKER-EE-001080 - The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker paths
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
DKER-EE-001090 - The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set - docker services
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
EP11-00-001200 - The EDB Postgres Advanced Server must generate audit records for DoD-defined auditable events.
PostgreSQLDB
EDB PostgreSQL Advanced Server v11 DB Audit v2r4
EPAS-00-002000 - The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
PostgreSQLDB
EnterpriseDB PostgreSQL Advanced Server DB v2r1
FNFG-FW-000040 - The FortiGate firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.
FortiGate
DISA Fortigate Firewall STIG v1r3
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure'
Unix
DISA STIG for Oracle Linux 5 v2r1