STIGhub
STIGs
RMF Controls
Compare
← AU-7 — Audit Record Reduction and Report Generation
CCI-001877
Definition
Provide an audit reduction capability that supports after-the-fact investigations of incidents.
Parent Control
AU-7
Audit Record Reduction and Report Generation
Audit and Accountability
Linked STIG Checks (39)
V-274017
CAT II
Amazon Linux 2023 must have the audit package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274018
CAT II
Amazon Linux 2023 must produce audit records containing information to establish what type of events occurred.
Amazon Linux 2023 Security Technical Implementation Guide
V-268080
CAT II
NixOS must enable the audit daemon.
Anduril NixOS Security Technical Implementation Guide
V-252534
CAT II
The macOS system must enable System Integrity Protection.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257240
CAT I
The macOS system must enable System Integrity Protection.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-222491
CAT II
The application must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
Application Security and Development Security Technical Implementation Guide
V-276014
CAT I
Ax-OS must off-load audit records onto a different system or media than the system being audited.
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
V-219225
CAT II
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238298
CAT II
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260590
CAT II
Ubuntu 22.04 LTS must have the "auditd" package installed.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-260591
CAT II
Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270656
CAT II
Ubuntu 24.04 LTS must have the "auditd" package installed.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-270657
CAT II
Ubuntu 24.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-206498
CAT III
The Central Log Server must be configured to perform audit reduction that supports after-the-fact investigations of security incidents.
Central Log Server Security Requirements Guide
V-269469
CAT II
The audit package must be installed on AlmaLinux OS 9.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269532
CAT II
The auditd service must be enabled on AlmaLinux OS 9.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-203705
CAT III
The operating system must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
General Purpose Operating System Security Requirements Guide
V-215242
CAT II
AIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.
IBM AIX 7.x Security Technical Implementation Guide
V-205558
CAT II
The Mainframe Product must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
Mainframe Product Security Requirements Guide
V-254181
CAT II
Nutanix AOS must provide the capability to centrally review and analyze audit records from multiple components within the system.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-248519
CAT II
The OL 8 audit package must be installed.
Oracle Linux 8 Security Technical Implementation Guide
V-248520
CAT II
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
Oracle Linux 8 Security Technical Implementation Guide
V-271519
CAT II
OL 9 must have the audit package installed.
Oracle Linux 9 Security Technical Implementation Guide
V-271520
CAT II
OL 9 audit service must be enabled.
Oracle Linux 9 Security Technical Implementation Guide
V-280993
CAT II
RHEL 10 must have the "audit" package installed.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-280994
CAT II
RHEL 10 must enable the audit service.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-258151
CAT II
RHEL 9 audit package must be installed.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258152
CAT II
RHEL 9 audit service must be enabled.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-275677
CAT II
Ubuntu OS must have the "auditd" package installed.
Riverbed NetIM OS Security Technical Implementation Guide
V-275678
CAT II
Ubuntu OS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
Riverbed NetIM OS Security Technical Implementation Guide
V-261410
CAT II
SLEM 5 must have the auditing package installed.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-261462
CAT II
SLEM 5 must generate audit records for all uses of privileged functions.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217190
CAT II
The SUSE operating system must have the auditing package installed.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-217209
CAT III
The SUSE operating system must generate audit records for all uses of the privileged functions.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-219959
CAT II
The audit system must support an audit reduction capability.
Solaris 11 SPARC Security Technical Implementation Guide
V-219988
CAT II
The audit system must support an audit reduction capability.
Solaris 11 X86 Security Technical Implementation Guide
V-252973
CAT II
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-207457
CAT II
The VMM must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
Virtual Machine Manager Security Requirements Guide
V-269586
CAT I
Xylok Security Suite must use a central log server for auditing records.
Xylok Security Suite 20.x Security Technical Implementation Guide