STIGhub
STIGs
RMF Controls
Compare
← AU-9 (3) — Protection of Audit Information
CCI-001496
Definition
Implement cryptographic mechanisms to protect the integrity of audit tools.
Parent Control
AU-9 (3)
Protection of Audit Information
Audit and Accountability
Linked STIG Checks (41)
V-279070
CAT II
ColdFusion must be configured to support integration with a third-party Security Information and Event Management (SIEM) to support notifications.
Adobe ColdFusion Security Technical Implementation Guide
V-274026
CAT II
Amazon Linux 2023 must use cryptographic mechanisms to protect the integrity of audit tools.
Amazon Linux 2023 Security Technical Implementation Guide
V-268555
CAT I
The macOS system must ensure System Integrity Protection is enabled.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277165
CAT I
The macOS system must ensure System Integrity Protection (SIP) is enabled.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-222508
CAT II
Application audit tools must be cryptographically hashed.
Application Security and Development Security Technical Implementation Guide
V-222509
CAT II
The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value.
Application Security and Development Security Technical Implementation Guide
V-204776
CAT II
The application server must use cryptographic mechanisms to protect the integrity of log tools.
Application Server Security Requirements Guide
V-219336
CAT II
The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238303
CAT II
The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260586
CAT II
Ubuntu 22.04 LTS must use cryptographic mechanisms to protect the integrity of audit tools.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270831
CAT II
Ubuntu 24.04 LTS must use cryptographic mechanisms to protect the integrity of audit tools.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-269545
CAT II
AlmaLinux OS 9 must use cryptographic mechanisms to protect the integrity of audit tools.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233142
CAT II
The container platform must use cryptographic mechanisms to protect the integrity of audit tools.
Container Platform Security Requirements Guide
V-203682
CAT I
The operating system must use cryptographic mechanisms to protect the integrity of audit tools.
General Purpose Operating System Security Requirements Guide
V-215251
CAT II
AIX must verify the hash of audit tools.
IBM AIX 7.x Security Technical Implementation Guide
V-205530
CAT II
The Mainframe Product must use cryptographic mechanisms to protect the integrity of audit tools.
Mainframe Product Security Requirements Guide
V-254187
CAT I
Nutanix AOS must use cryptographic mechanisms to protect the integrity of audit tools.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279574
CAT I
Nutanix OS must use cryptographic mechanisms to protect the integrity of audit tools.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221652
CAT I
The Oracle Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
Oracle Linux 7 Security Technical Implementation Guide
V-248810
CAT II
OL 8 must use cryptographic mechanisms to protect the integrity of audit tools.
Oracle Linux 8 Security Technical Implementation Guide
V-271569
CAT II
OL 9 must use cryptographic mechanisms to protect the integrity of audit tools.
Oracle Linux 9 Security Technical Implementation Guide
V-252846
CAT II
Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
V-256908
CAT II
Automation Controller must use cryptographic mechanisms to protect the integrity of log tools.
Red Hat Ansible Automation Controller Application Server Security Technical Implementation Guide
V-280978
CAT I
RHEL 10 must use cryptographic mechanisms to protect the integrity of audit tools.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-204392
CAT I
The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-230475
CAT II
RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-258137
CAT II
RHEL 9 must use cryptographic mechanisms to protect the integrity of audit tools.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257522
CAT II
All audit records must generate the event results within OpenShift.
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
V-275673
CAT I
Ubuntu OS must use cryptographic mechanisms to protect the integrity of audit tools.
Riverbed NetIM OS Security Technical Implementation Guide
V-261406
CAT II
SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217152
CAT II
The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-216285
CAT II
System packages must be configured with the vendor-provided files, permissions, and ownerships.
Solaris 11 SPARC Security Technical Implementation Guide
V-216050
CAT II
System packages must be configured with the vendor-provided files, permissions, and ownerships.
Solaris 11 X86 Security Technical Implementation Guide
V-253023
CAT II
TOSS must use cryptographic mechanisms to protect the integrity of audit tools.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-282534
CAT II
TOSS 5 must use cryptographic mechanisms to protect the integrity of audit tools.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-239590
CAT II
The SLES for vRealize must use cryptographic mechanisms to protect the integrity of audit tools.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-256447
CAT II
The ESXi host must implement Secure Boot enforcement.
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
V-256525
CAT II
The Photon operating system package files must not be modified.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-258741
CAT II
The ESXi host must enable Secure Boot.
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
V-258839
CAT I
The Photon operating system must use cryptographic mechanisms to protect the integrity of audit tools.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-207431
CAT II
The VMM must use cryptographic mechanisms to protect the integrity of audit tools.
Virtual Machine Manager Security Requirements Guide