STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-9 (3) — Protection of Audit Information

CCI-001350

Definition

Implement cryptographic mechanisms to protect the integrity of audit information.

Parent Control

AU-9 (3)Protection of Audit InformationAudit and Accountability

Linked STIG Checks (18)

V-279070CAT IIColdFusion must be configured to support integration with a third-party Security Information and Event Management (SIEM) to support notifications.Adobe ColdFusion Security Technical Implementation GuideV-222507CAT IIThe application must use cryptographic mechanisms to protect the integrity of audit information.Application Security and Development Security Technical Implementation GuideV-204739CAT IIThe application server must use cryptographic mechanisms to protect the integrity of log information.Application Server Security Requirements GuideV-272632CAT IICylanceON-PREM must be configured to support integration with a third-party Security Information and Event Management (SIEM) to support notifications.Arctic Wolf CylanceON-PREM Security Technical Implementation GuideV-233063CAT IIThe container platform must use FIPS validated cryptographic mechanisms to protect the integrity of log information.Container Platform Security Requirements GuideV-270945CAT IIThe Dragos Platform must have disk encryption enabled on a virtual machines (VMs).Dragos Platform 2.x Security Technical Implementation GuideV-228987CAT IIThe BIG-IP appliance must be configured to use NIAP evaluated cryptographic mechanisms to protect the integrity of audit information at rest.F5 BIG-IP Device Management Security Technical Implementation GuideV-255776CAT IIThe MQ Appliance messaging server must implement cryptography mechanisms to protect the integrity of the remote access session.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-250330CAT IIThe WebSphere Liberty Server must be configured to encrypt log information.IBM WebSphere Liberty Server Security Technical Implementation GuideV-255854CAT IIThe WebSphere Application Server must be configured to encrypt log information.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-255855CAT IIThe WebSphere Application Server must be configured to sign log information.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-252843CAT IRancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation GuideV-257536CAT IIOpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.Red Hat OpenShift Container Platform 4.12 Security Technical Implementation GuideV-257536CAT IIOpenShift must use FIPS-validated cryptographic mechanisms to protect the integrity of log information.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-257546CAT IOpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-216415CAT IIIThe operating system must use cryptographic mechanisms to protect the integrity of audit information.Solaris 11 SPARC Security Technical Implementation GuideV-216178CAT IIIThe operating system must use cryptographic mechanisms to protect the integrity of audit information.Solaris 11 X86 Security Technical Implementation GuideV-241131CAT ITrend Deep Security must use cryptographic mechanisms to protect the integrity of audit information.Trend Micro Deep Security 9.x Security Technical Implementation Guide