Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001880
CCI
CCI|CCI-001880
Title
Provide a report generation capability that supports after-the-fact investigations of security incidents.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AIX7-00-002036 - AIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.
Unix
DISA STIG AIX 7.x v3r1
AOSX-13-000240 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple Mac OSX 10.15 v1r10
APPL-11-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple macOS 11 v1r8
APPL-11-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple macOS 11 v1r5
APPL-12-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple macOS 12 v1r9
APPL-13-005001 - The macOS system must enable System Integrity Protection.
Unix
DISA STIG Apple macOS 13 v1r4
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Low
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-171
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Low
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - CNSSI 1253
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Moderate
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 High
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - All Profiles
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r4 Low
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 High
Catalina - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Catalina v1.5.0 - 800-53r5 Moderate
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 Moderate
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 High
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 Low
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - All Profiles
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - CNSSI 1253
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r5 Moderate
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 Low
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-53r4 High
Monterey - Ensure System Integrity Protection is Enabled
Unix
NIST macOS Monterey v1.0.0 - 800-171
OL08-00-030180 - The OL 8 audit package must be installed.
Unix
DISA Oracle Linux 8 STIG v2r2
OL08-00-030181 - OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
Unix
DISA Oracle Linux 8 STIG v2r2
RHEL-09-653010 - RHEL 9 audit package must be installed.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
RHEL-09-653015 - RHEL 9 audit service must be enabled.
Unix
DISA Red Hat Enterprise Linux 9 STIG v2r2
SLES-12-020000 - The SUSE operating system must have the auditing package installed.
Unix
DISA SLES 12 STIG v3r1
SLES-12-020240 - The SUSE operating system must generate audit records for all uses of the privileged functions.
Unix
DISA SLES 12 STIG v3r1
SLES-15-030640 - The SUSE operating system must generate audit records for all uses of the privileged functions.
Unix
DISA SLES 15 STIG v2r2
SLES-15-030650 - The SUSE operating system must have the auditing package installed.
Unix
DISA SLES 15 STIG v2r2
SOL-11.1-010070 - The audit system records must be able to be used by a report generation capability.
Unix
DISA STIG Solaris 11 SPARC v3r1
SOL-11.1-010070 - The audit system records must be able to be used by a report generation capability.
Unix
DISA STIG Solaris 11 X86 v3r1
UBTU-16-020000 - Audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events - enabled
Unix
DISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-020000 - Audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events - installed
Unix
DISA STIG Ubuntu 16.04 LTS v2r3
UBTU-18-010250 - The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
Unix
DISA STIG Ubuntu 18.04 LTS v2r15
UBTU-20-010182 - The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
Unix
DISA STIG Ubuntu 20.04 LTS v2r1
UBTU-22-653010 - Ubuntu 22.04 LTS must have the 'auditd' package installed.
Unix
DISA STIG Canonical Ubuntu 22.04 LTS v2r2