STIGhub
STIGs
RMF Controls
Compare
← AC-2 (4) — Account Management
CCI-000018
Definition
Automatically audit account creation actions.
Parent Control
AC-2 (4)
Account Management
Access Control
Linked STIG Checks (193)
V-204640
CAT II
AAA Services must be configured to automatically audit account creation.
AAA Services Security Requirements Guide
V-76463
CAT II
The Akamai Luna Portal must automatically audit account creation.
Akamai KSD Service Impact Level 2 NDM Security Technical Implementation Guide
V-274081
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Amazon Linux 2023 Security Technical Implementation Guide
V-274082
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Amazon Linux 2023 Security Technical Implementation Guide
V-274083
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Amazon Linux 2023 Security Technical Implementation Guide
V-274084
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Amazon Linux 2023 Security Technical Implementation Guide
V-274085
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274104
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274113
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274114
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Amazon Linux 2023 Security Technical Implementation Guide
V-268080
CAT II
NixOS must enable the audit daemon.
Anduril NixOS Security Technical Implementation Guide
V-252462
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257168
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-259452
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-268452
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277060
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-222413
CAT II
The application must automatically audit account creation.
Application Security and Development Security Technical Implementation Guide
V-237321
CAT I
The ArcGIS Server must use Windows authentication for supporting account management functions.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-217356
CAT II
The Arista Multilayer Switch must automatically audit account creation.
Arista MLS DCS-7000 Series NDM Security Technical Implementation Guide
V-255951
CAT II
The Arista network device must be configured to audit all administrator activity.
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide
V-255951
CAT II
The Arista network device must be configured to audit all administrator activity.
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
V-219220
CAT II
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238238
CAT II
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238239
CAT II
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238240
CAT II
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-238242
CAT II
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260628
CAT II
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260629
CAT II
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260630
CAT II
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260631
CAT II
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260632
CAT II
Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270684
CAT II
Ubuntu 24.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270685
CAT II
Ubuntu 24.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270686
CAT II
Ubuntu 24.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270687
CAT II
Ubuntu 24.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270688
CAT II
Ubuntu 24.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-221900
CAT II
The Central Log Server must automatically audit account creation.
Central Log Server Security Requirements Guide
V-271939
CAT II
The Cisco ACI must automatically audit account creation.
Cisco ACI NDM Security Technical Implementation Guide
V-239897
CAT II
The Cisco ASA must be configured to automatically audit account creation.
Cisco ASA NDM Security Technical Implementation Guide
V-215663
CAT II
The Cisco router must be configured to automatically audit account creation.
Cisco IOS Router NDM Security Technical Implementation Guide
V-220571
CAT II
The Cisco switch must be configured to automatically audit account creation.
Cisco IOS Switch NDM Security Technical Implementation Guide
V-215808
CAT II
The Cisco router must be configured to automatically audit account creation.
Cisco IOS XE Router NDM Security Technical Implementation Guide
V-220519
CAT II
The Cisco switch must be configured to automatically audit account creation.
Cisco IOS XE Switch NDM Security Technical Implementation Guide
V-242609
CAT II
For the local web-based account of last resort, the Cisco ISE must automatically audit account creation.
Cisco ISE NDM Security Technical Implementation Guide
V-220475
CAT II
The Cisco switch must be configured to automatically audit account creation.
Cisco NX OS Switch NDM Security Technical Implementation Guide
V-269129
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269130
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269131
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269132
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269133
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269134
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269135
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect the files within /etc/sudoers.d/
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233022
CAT II
The container platform must automatically audit account creation.
Container Platform Security Requirements Guide
V-255530
CAT II
The DBN-6300 must automatically audit account creation.
DBN-6300 NDM Security Technical Implementation Guide
V-269774
CAT II
The Dell OS10 Switch must initiate session auditing upon startup.
Dell OS10 Switch NDM Security Technical Implementation Guide
V-217383
CAT II
The BIG-IP appliance must automatically audit account creation.
F5 BIG-IP Device Management Security Technical Implementation Guide
V-266068
CAT II
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
V-234162
CAT II
The FortiGate device must automatically audit account creation.
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
V-203593
CAT II
The operating system must audit all account creations.
General Purpose Operating System Security Requirements Guide
V-217427
CAT II
The HP FlexFabric Switch must automatically audit account creation.
HP FlexFabric Switch NDM Security Technical Implementation Guide
V-266908
CAT II
AOS must automatically audit account creation.
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
V-268231
CAT II
The HYCU virtual appliance must automatically audit account creation.
HYCU Protege Security Technical Implementation Guide
V-215246
CAT II
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM AIX 7.x Security Technical Implementation Guide
V-223544
CAT II
IBM z/OS Required SMF data record types must be collected.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223653
CAT II
IBM RACF SETROPTS LOGOPTIONS must be properly configured.
IBM z/OS RACF Security Technical Implementation Guide
V-223767
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS RACF Security Technical Implementation Guide
V-223998
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS TSS Security Technical Implementation Guide
V-237899
CAT II
CA VM:Secure product must be installed and operating.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-258601
CAT II
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
Ivanti Connect Secure NDM Security Technical Implementation Guide
V-253879
CAT II
The Juniper EX switch must be configured to automatically audit account creation.
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
V-217306
CAT II
The Juniper router must be configured to automatically audit account creation.
Juniper Router NDM Security Technical Implementation Guide
V-66459
CAT II
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account creation events.
Juniper SRX SG NDM Security Technical Implementation Guide
V-223181
CAT II
For local accounts created on the device, the Juniper SRX Services Gateway must automatically generate log records for account creation events.
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
V-242403
CAT II
Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
Kubernetes Security Technical Implementation Guide
V-205447
CAT II
The Mainframe Product must automatically audit account creation.
Mainframe Product Security Requirements Guide
V-220750
CAT II
The system must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220751
CAT II
The system must be configured to audit Account Management - User Account Management failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-220752
CAT II
The system must be configured to audit Account Management - User Account Management successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-224884
CAT II
Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224885
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224886
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224986
CAT II
Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205625
CAT II
Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205626
CAT II
Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205627
CAT II
Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205628
CAT II
Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254303
CAT II
Windows Server 2022 must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254304
CAT II
Windows Server 2022 must be configured to audit Account Management - User Account Management successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254305
CAT II
Windows Server 2022 must be configured to audit Account Management - User Account Management failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254407
CAT II
Windows Server 2022 must be configured to audit Account Management - Computer Account Management successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278050
CAT II
Windows Server 2025 must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278051
CAT II
Windows Server 2025 must be configured to audit Account Management - User Account Management successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278052
CAT II
Windows Server 2025 must be configured to audit Account Management - User Account Management failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278154
CAT II
Windows Server 2025 must be configured to audit Account Management - Computer Account Management successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-260914
CAT II
Audit logging must be enabled on MKE.
Mirantis Kubernetes Engine Security Technical Implementation Guide
V-202013
CAT II
The network device must automatically audit account creation.
Network Device Management Security Requirements Guide
V-254127
CAT II
Nutanix AOS must audit all account actions.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279541
CAT II
Nutanix OS must audit all account change actions.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221825
CAT II
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Oracle Linux 7 Security Technical Implementation Guide
V-221826
CAT II
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Oracle Linux 7 Security Technical Implementation Guide
V-221827
CAT II
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Oracle Linux 7 Security Technical Implementation Guide
V-221828
CAT II
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Oracle Linux 7 Security Technical Implementation Guide
V-221829
CAT II
The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Oracle Linux 7 Security Technical Implementation Guide
V-248740
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
Oracle Linux 8 Security Technical Implementation Guide
V-248741
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
Oracle Linux 8 Security Technical Implementation Guide
V-248742
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
Oracle Linux 8 Security Technical Implementation Guide
V-248743
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
Oracle Linux 8 Security Technical Implementation Guide
V-248744
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/group".
Oracle Linux 8 Security Technical Implementation Guide
V-248745
CAT II
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
Oracle Linux 8 Security Technical Implementation Guide
V-248746
CAT II
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
Oracle Linux 8 Security Technical Implementation Guide
V-271527
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Oracle Linux 9 Security Technical Implementation Guide
V-271528
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Oracle Linux 9 Security Technical Implementation Guide
V-271529
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Oracle Linux 9 Security Technical Implementation Guide
V-271530
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Oracle Linux 9 Security Technical Implementation Guide
V-271531
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Oracle Linux 9 Security Technical Implementation Guide
V-271532
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Oracle Linux 9 Security Technical Implementation Guide
V-271533
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Oracle Linux 9 Security Technical Implementation Guide
V-235933
CAT II
Oracle WebLogic must automatically audit account creation.
Oracle WebLogic Server 12c Security Technical Implementation Guide
V-273788
CAT II
The RUCKUS ICX device must initiate session auditing upon startup.
RUCKUS ICX NDM Security Technical Implementation Guide
V-252844
CAT II
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
V-254555
CAT II
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Rancher Government Solutions RKE2 Security Technical Implementation Guide
V-281154
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281155
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect the "/etc/sudoers.d/" directory.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281156
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/group".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281157
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/gshadow".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281158
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/opasswd".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281159
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/passwd".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281160
CAT II
RHEL 10 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/shadow".
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-204564
CAT II
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204565
CAT II
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204566
CAT II
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204567
CAT II
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-204568
CAT II
The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-258217
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258218
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258219
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258220
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258221
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258222
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258223
CAT II
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257509
CAT II
OpenShift must automatically audit account creation.
Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
V-257509
CAT II
OpenShift must automatically audit account creation.
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
V-275452
CAT I
The Riverbed NetIM must enable and configure user audit logging.
Riverbed NetIM NDM Security Technical Implementation Guide
V-275713
CAT II
Ubuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Riverbed NetIM OS Security Technical Implementation Guide
V-275714
CAT II
Ubuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Riverbed NetIM OS Security Technical Implementation Guide
V-275715
CAT II
Ubuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Riverbed NetIM OS Security Technical Implementation Guide
V-275716
CAT II
Ubuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Riverbed NetIM OS Security Technical Implementation Guide
V-275717
CAT II
Ubuntu OS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Riverbed NetIM OS Security Technical Implementation Guide
V-256072
CAT I
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Riverbed NetProfiler Security Technical Implementation Guide
V-261449
CAT II
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-261450
CAT II
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-261451
CAT II
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-261452
CAT II
SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217205
CAT II
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-217206
CAT II
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-217207
CAT II
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-217208
CAT II
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-217240
CAT II
The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-22376
CAT III
The audit system must be configured to audit account creation.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-216259
CAT II
The audit system must be configured to audit account creation.
Solaris 11 SPARC Security Technical Implementation Guide
V-216024
CAT II
The audit system must be configured to audit account creation.
Solaris 11 X86 Security Technical Implementation Guide
V-279252
CAT I
The Edge SWG must be configured to send log data to at least one central log server for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
Symantec Edge SWG NDM Security Technical Implementation Guide
V-241111
CAT II
Trend Deep Security must automatically audit account creation.
Trend Micro Deep Security 9.x Security Technical Implementation Guide
V-242259
CAT I
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
Trend Micro TippingPoint NDM Security Technical Implementation Guide
V-252972
CAT II
TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-282353
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282354
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282355
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282356
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282357
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282358
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282359
CAT II
TOSS 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-234289
CAT II
The UEM server must automatically audit account creation.
Unified Endpoint Management Server Security Requirements Guide
V-240345
CAT II
The SLES for vRealize must audit all account creations.
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
V-240346
CAT II
In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications. Any unexpected users, groups, or modifications must be investigated for legitimacy.
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
V-239443
CAT II
The SLES for vRealize must audit all account creations.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-239444
CAT II
In addition to auditing new user and group accounts, these watches will alert the system administrator(s) to any modifications, any unexpected users, groups, or modifications must be investigated for legitimacy.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-256478
CAT II
The Photon operating system must audit all account creations.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-258801
CAT II
The Photon operating system must audit all account creations.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-207341
CAT II
The VMM must automatically audit account creation.
Virtual Machine Manager Security Requirements Guide
V-73417
CAT II
Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73417
CAT II
Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73423
CAT II
Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73423
CAT II
Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73427
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73427
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management successes.
Windows Server 2016 Security Technical Implementation Guide
V-73429
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management failures.
Windows Server 2016 Security Technical Implementation Guide
V-73429
CAT II
Windows Server 2016 must be configured to audit Account Management - User Account Management failures.
Windows Server 2016 Security Technical Implementation Guide
V-92979
CAT II
Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
Windows Server 2019 Security Technical Implementation Guide
V-92981
CAT II
Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
Windows Server 2019 Security Technical Implementation Guide
V-92983
CAT II
Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
Windows Server 2019 Security Technical Implementation Guide
V-92985
CAT II
Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
Windows Server 2019 Security Technical Implementation Guide
V-269574
CAT I
Xylok Security Suite must use a centralized user management solution.
Xylok Security Suite 20.x Security Technical Implementation Guide