Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000135
CCI
CCI|CCI-000135
Title
Generate audit records containing the organization-defined additional information that is to be included in the audit records.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
4.1.3.8 Ensure changes to system administration scope (sudoers) is collected - sudoers
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.8 Ensure changes to system administration scope (sudoers) is collected - sudoers.d
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.10 Ensure use of privileged commands is collected
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.15 Ensure all uses of the passwd command are audited.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.16 Ensure auditing of the unix_chkpwd command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.17 Ensure audit of the gpasswd command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.18 Ensure audit all uses of chage
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.19 Ensure audit all uses of the chsh command.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.20 Ensure audit the umount command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.21 Ensure audit of postdrop command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.22 Ensure audit of postqueue command.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.23 Ensure audit ssh-keysign command.
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.24 Ensure audit of crontab command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.36 Ensure audit of the userhelper command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.37 Ensure audit of the mount command and syscall
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.37 Ensure audit of the mount command and syscall - 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.37 Ensure audit of the mount command and syscall - 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.38 Ensure audit of the su command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.40 Ensure audit all uses of the newgrp command
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AIX7-00-002006 - AIX must produce audit records containing the full-text recording of privileged commands.
Unix
DISA STIG AIX 7.x v3r1
AMLS-NM-000200 - The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands.
Arista
DISA STIG Arista MLS DCS-7000 Series NDM v1r4
AOSX-15-001003 - The macOS system must initiate session audits at system startup
Unix
DISA STIG Apple Mac OSX 10.15 v1r10
APPL-13-001003 - The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.
Unix
DISA STIG Apple macOS 13 v1r4
APPL-14-001003 - The macOS system must enable security auditing.
Unix
DISA Apple macOS 14 (Sonoma) STIG v2r2
APPL-15-001003 - The macOS system must enable security auditing.
Unix
DISA Apple macOS 15 (Sequoia) STIG v1r1
ARST-ND-000150 - The Arista network device must be configured to audit all administrator activity.
Arista
DISA STIG Arista MLS EOS 4.2x NDM v2r1
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Enable Security Auditing
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
CASA-ND-000320 - The Cisco ASA must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco ASA NDM v2r2
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Enable Security Auditing
Unix
NIST macOS Catalina v1.5.0 - All Profiles
CD12-00-003500 - PostgreSQL must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
PostgreSQLDB
DISA STIG Crunchy Data PostgreSQL DB v3r1
CISC-ND-000330 - The Cisco router must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco IOS Router NDM v3r2
CISC-ND-000330 - The Cisco router must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco IOS XE Router NDM v3r2
CISC-ND-000330 - The Cisco switch must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco IOS Switch NDM v3r2
CISC-ND-000330 - The Cisco switch must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco IOS XE Switch NDM v3r2
CISC-ND-000330 - The Cisco switch must be configured to generate audit records containing the full-text recording of privileged commands.
Cisco
DISA STIG Cisco NX-OS Switch NDM v3r2
CNTR-K8-000700 - Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
Unix
DISA STIG Kubernetes v2r2
CNTR-R2-000060 Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Unix
DISA Rancher Government Solutions RKE2 STIG v2r2