STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-3 (2) — Content of Audit Records

CCI-001844

Definition

The information system provides centralized management and configuration of the content to be captured in audit records generated by organization-defined information system components.

Parent Control

AU-3 (2)Content of Audit RecordsAudit and Accountability

Linked STIG Checks (30)

V-261917CAT IIPostgreSQL must use centralized management of the content captured in audit records generated by all components of PostgreSQL.Crunchy Data Postgres 16 Security Technical Implementation GuideV-237565CAT IIThe DBN-6300 must support centralized management and configuration of the content captured in audit records generated by all DBN-6300 components.DBN-6300 IDPS Security Technical Implementation GuideV-224195CAT IIThe EDB Postgres Advanced Server must utilize centralized management of the content captured in audit records generated by all components of the EDB Postgres Advanced Server.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-224196CAT IIThe EDB Postgres Advanced Server must provide centralized configuration of the content to be captured in audit records generated by all components of the EDB Postgres Advanced Server.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-213620CAT IIThe EDB Postgres Advanced Server must utilize centralized management of the content captured in audit records generated by all components of the EDB Postgres Advanced Server.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213621CAT IIThe EDB Postgres Advanced Server must provide centralized configuration of the content to be captured in audit records generated by all components of the EDB Postgres Advanced Server.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-252556CAT IIThe IBM Aspera Platform must be configured to support centralized management and configuration.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-213719CAT IIDB2 must utilize centralized management of the content captured in audit records generated by all components of DB2.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-65257CAT IIThe DataPower Gateway must be configured to support centralized management and configuration.IBM DataPower ALG Security Technical Implementation GuideV-255814CAT IIThe MQ Appliance messaging server must provide centralized management and configuration of the content to be captured in log records generated by all application components.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-237899CAT IICA VM:Secure product must be installed and operating.IBM zVM Using CA VM:Secure Security Technical Implementation GuideV-55323CAT IIIDPS must support centralized management and configuration of the content captured in audit records generated by all IDPS components.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-213867CAT IISQL Server must utilize centralized management of the content captured in audit records generated by all components of the DBMS.MS SQL Server 2014 Instance Security Technical Implementation GuideV-221160CAT IIMongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-221188CAT IIMongoDB must utilize centralized management of the content captured in audit records generated by all components of MongoDB.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-252134CAT IIMongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-252171CAT IIMongoDB must utilize centralized management of the content captured in audit records generated by all components of MongoDB.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-265907CAT IIMongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-214080CAT IIPostgreSQL must utilize centralized management of the content captured in audit records generated by all components of PostgreSQL.PostgreSQL 9.x Security Technical Implementation GuideV-254093CAT IInnoslate must use multifactor authentication for network access to privileged and non-privileged accounts.SPEC Innovations Innoslate 4.x Security Technical Implementation GuideV-240304CAT IIThe vRA PostgreSQL database must have log collection enabled.VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation GuideV-240341CAT IIThe vRA PostgreSQL database must have log collection enabled.VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation GuideV-239803CAT IIThe vROps PostgreSQL DB must utilize centralized management of the content captured in audit records generated by all components of the DBMS.VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation GuideV-239804CAT IIThe vROps PostgreSQL DB must provide centralized configuration of the content to be captured in audit records generated by all components of the DBMS.VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation GuideV-251730CAT IIThe NSX-T Distributed Firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.VMware NSX-T Distributed Firewall Security Technical Implementation GuideV-251766CAT IIThe NSX-T Tier-1 Gateway Firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.VMware NSX-T Tier 1 Gateway Firewall Security Technical Implementation GuideV-251738CAT IIThe NSX-T Tier-0 Gateway Firewall must be configured to use the TLS or LI-TLS protocols to configure and secure communications with the central audit server.VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation GuideV-240950CAT IIThe vAMI must utilize syslog.VMware vRealize Automation 7.x vAMI Security Technical Implementation GuideV-256607CAT IIVMware Postgres must have log collection enabled.VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation GuideV-259181CAT IIThe vCenter PostgreSQL service must have log collection enabled.VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide