STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-8 — Time Stamps

CCI-000159

Definition

Use internal system clocks to generate time stamps for audit records.

Parent Control

AU-8Time StampsAudit and Accountability

Linked STIG Checks (31)

V-204655CAT IIAAA Services must be configured to use internal system clocks to generate time stamps for audit records.AAA Services Security Requirements GuideV-274017CAT IIAmazon Linux 2023 must have the audit package installed.Amazon Linux 2023 Security Technical Implementation GuideV-268090CAT IIThe NixOS audit package must be installed.Anduril NixOS Security Technical Implementation GuideV-252464CAT IIThe macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257170CAT IIThe macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-268454CAT IIThe macOS system must enable security auditing.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277062CAT IIThe macOS system must enable security auditing.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-222497CAT IIThe applications must use internal system clocks to generate time stamps for audit records.Application Security and Development Security Technical Implementation GuideV-204731CAT IIThe application server must use internal system clocks to generate time stamps for log records.Application Server Security Requirements GuideV-276014CAT IAx-OS must off-load audit records onto a different system or media than the system being audited.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-206457CAT IIIThe Central Log Server must be configured to use internal system clocks to generate time stamps for log records.Central Log Server Security Requirements GuideV-233055CAT IIThe container platform must use internal system clocks to generate audit record time stamps.Container Platform Security Requirements GuideV-255546CAT IIThe DBN-6300 must use internal system clocks to generate time stamps for audit records.DBN-6300 NDM Security Technical Implementation GuideV-206537CAT IIThe DBMS must use system clocks to generate time stamps for use in audit records and application data.Database Security Requirements GuideV-203615CAT IIThe operating system must use internal system clocks to generate time stamps for audit records.General Purpose Operating System Security Requirements GuideV-217447CAT IIThe HP FlexFabric Switch must use internal system clocks to generate time stamps for audit records.HP FlexFabric Switch NDM Security Technical Implementation GuideV-205476CAT IIThe Mainframe Products must use internal system clocks to generate time stamps for audit records.Mainframe Product Security Requirements GuideV-202039CAT IIThe network device must use internal system clocks to generate time stamps for audit records.Network Device Management Security Requirements GuideV-254106CAT IIINutanix AOS must be configured to synchronize internal information system clocks using redundant authoritative time sources.Nutanix AOS 5.20.x Application Security Technical Implementation GuideV-279426CAT IINutanix AOS must use internal system clocks to generate time stamps for log records.Nutanix Acropolis Application Server Security Technical Implementation GuideV-271519CAT IIOL 9 must have the audit package installed.Oracle Linux 9 Security Technical Implementation GuideV-235954CAT IIIOracle WebLogic must use internal system clocks to generate time stamps for audit records.Oracle WebLogic Server 12c Security Technical Implementation GuideV-258151CAT IIRHEL 9 audit package must be installed.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-257525CAT IIOpenShift must use internal system clocks to generate audit record time stamps.Red Hat OpenShift Container Platform 4.12 Security Technical Implementation GuideV-257526CAT IIThe Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.Red Hat OpenShift Container Platform 4.12 Security Technical Implementation GuideV-257525CAT IIOpenShift must use internal system clocks to generate audit record time stamps.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-257526CAT IIThe Red Hat Enterprise Linux CoreOS (RHCOS) chrony Daemon must use multiple NTP servers to generate audit record time stamps.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-275615CAT IIIUbuntu OS must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).Riverbed NetIM OS Security Technical Implementation GuideV-234340CAT IIThe UEM server must use host operating system clocks to generate time stamps for audit records.Unified Endpoint Management Server Security Requirements GuideV-207362CAT IIThe VMM must use internal system clocks to generate time stamps for audit records.Virtual Machine Manager Security Requirements GuideV-206367CAT IIThe web server must use the internal system clock to generate time stamps for log records.Web Server Security Requirements Guide