STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-8 — Time Stamps

CCI-001889

Definition

Record time stamps for audit records that meet organization-defined granularity of time measurement.

Parent Control

AU-8Time StampsAudit and Accountability

Linked STIG Checks (80)

V-204692CAT IIAAA Services must be configured with a minimum granularity of one second to record time stamps for audit records.AAA Services Security Requirements GuideV-274017CAT IIAmazon Linux 2023 must have the audit package installed.Amazon Linux 2023 Security Technical Implementation GuideV-274018CAT IIAmazon Linux 2023 must produce audit records containing information to establish what type of events occurred.Amazon Linux 2023 Security Technical Implementation GuideV-274024CAT IIAmazon Linux 2023 must have the Advanced Intrusion Detection Environment (AIDE) package installed.Amazon Linux 2023 Security Technical Implementation GuideV-268080CAT IINixOS must enable the audit daemon.Anduril NixOS Security Technical Implementation GuideV-214265CAT IIThe Apache web server must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) which are stamped at a minimum granularity of one second.Apache Server 2.4 UNIX Server Security Technical Implementation GuideV-252464CAT IIThe macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257170CAT IIThe macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-268454CAT IIThe macOS system must enable security auditing.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277062CAT IIThe macOS system must enable security auditing.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-222499CAT IIThe application must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Application Security and Development Security Technical Implementation GuideV-204795CAT IIThe application server must record time stamps for log records that meet a granularity of one second for a minimum degree of precision.Application Server Security Requirements GuideV-255958CAT IIThe Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.Arista MLS EOS 4.2x NDM Security Technical Implementation GuideV-255958CAT IIThe Arista network device must be configured to synchronize internal system clocks using redundant authenticated time sources.Arista MLS EOS 4.X NDM Security Technical Implementation GuideV-255514CAT IIIThe CA API Gateway must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.CA API Gateway NDM Security Technical Implementation GuideV-206505CAT IIIThe Central Log Server must be configured to record time stamps for when log records are received by the log server that meet a granularity of one second for a minimum degree of precision.Central Log Server Security Requirements GuideV-239925CAT IIThe Cisco ASA must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Cisco ASA NDM Security Technical Implementation GuideV-215693CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS Router NDM Security Technical Implementation GuideV-220601CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS Switch NDM Security Technical Implementation GuideV-215838CAT IIThe Cisco router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XE Router NDM Security Technical Implementation GuideV-220549CAT IIThe Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.Cisco IOS XE Switch NDM Security Technical Implementation GuideV-216536CAT IIThe Cisco router must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Cisco IOS XR Router NDM Security Technical Implementation GuideV-269469CAT IIThe audit package must be installed on AlmaLinux OS 9.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269532CAT IIThe auditd service must be enabled on AlmaLinux OS 9.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-233182CAT IIThe container platform must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Container Platform Security Requirements GuideV-233581CAT IIPostgreSQL must generate time stamps, for audit records and application data, with a minimum granularity of one second.Crunchy Data PostgreSQL Security Technical Implementation GuideV-261922CAT IIPostgreSQL must generate time stamps for audit records and application data with a minimum granularity of one second.Crunchy Data Postgres 16 Security Technical Implementation GuideV-255571CAT IIThe DBN-6300 must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.DBN-6300 NDM Security Technical Implementation GuideV-206595CAT IIThe DBMS must generate time stamps, for audit records and application data, with a minimum granularity of one second.Database Security Requirements GuideV-259282CAT IIThe EDB Postgres Advanced Server must generate time stamps for audit records and application data, with a minimum granularity of one second.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-278385CAT IINGINX must provide audit records for DOD-defined auditable events.F5 NGINX Security Technical Implementation GuideV-203713CAT IIThe operating system must record time stamps for audit records that meet a minimum granularity of one second for a minimum degree of precision.General Purpose Operating System Security Requirements GuideV-217467CAT IIThe HP FlexFabric Switch must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.HP FlexFabric Switch NDM Security Technical Implementation GuideV-213787CAT IITime stamps in database tables, intended for auditing or activity-tracking purposes, must include both date and time of day, with a minimum granularity of one second.MS SQL Server 2014 Database Security Technical Implementation GuideV-202103CAT IIThe network device must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Network Device Management Security Requirements GuideV-279565CAT IINutanix OS must have the audit.x86_64 package installed.Nutanix Acropolis GPOS Security Technical Implementation GuideV-248519CAT IIThe OL 8 audit package must be installed.Oracle Linux 8 Security Technical Implementation GuideV-248520CAT IIOL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.Oracle Linux 8 Security Technical Implementation GuideV-271519CAT IIOL 9 must have the audit package installed.Oracle Linux 9 Security Technical Implementation GuideV-271520CAT IIOL 9 audit service must be enabled.Oracle Linux 9 Security Technical Implementation GuideV-214115CAT IIPostgreSQL must generate time stamps, for audit records and application data, with a minimum granularity of one second.PostgreSQL 9.x Security Technical Implementation GuideV-252844CAT IIRancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation GuideV-254555CAT IIRancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.Rancher Government Solutions RKE2 Security Technical Implementation GuideV-280993CAT IIRHEL 10 must have the "audit" package installed.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-280994CAT IIRHEL 10 must enable the audit service.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-258151CAT IIRHEL 9 audit package must be installed.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-258152CAT IIRHEL 9 audit service must be enabled.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-256087CAT IIThe Riverbed NetProfiler must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Riverbed NetProfiler Security Technical Implementation GuideV-261410CAT IISLEM 5 must have the auditing package installed.SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation GuideV-261462CAT IISLEM 5 must generate audit records for all uses of privileged functions.SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation GuideV-217190CAT IIThe SUSE operating system must have the auditing package installed.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-217209CAT IIIThe SUSE operating system must generate audit records for all uses of the privileged functions.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-282437CAT IITOSS 5 audit package must be installed.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-282438CAT IITOSS 5 audit service must be enabled.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-234517CAT IIThe UEM server must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Unified Endpoint Management Server Security Requirements GuideV-240308CAT IIvRA PostgreSQL database log file data must contain required data elements.VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation GuideV-239808CAT IIThe vROps PostgreSQL DB must generate time stamps, for audit records and application data, with a minimum granularity of one second.VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation GuideV-240264CAT IILighttpd must record time stamps for log records to a minimum granularity of time.VMware vRealize Automation 7.x Lighttpd Security Technical Implementation GuideV-240851CAT IItc Server HORIZON must record time stamps for log records to a minimum granularity of one second.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240852CAT IItc Server VCO must record time stamps for log records to a minimum granularity of one second.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-240853CAT IItc Server VCAC must record time stamps for log records to a minimum granularity of one second.VMware vRealize Automation 7.x tc Server Security Technical Implementation GuideV-241707CAT IItc Server UI must record time stamps for log records to a minimum granularity of one second.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241708CAT IItc Server CaSa must record time stamps for log records to a minimum granularity of one second.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-241709CAT IItc Server API must record time stamps for log records to a minimum granularity of one second.VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation GuideV-256650CAT IIVAMI must produce log records containing sufficient information to establish what type of events occurred.VMware vSphere 7.0 VAMI Security Technical Implementation GuideV-256677CAT IIESX Agent Manager must record user access in a format that enables monitoring of remote access.VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation GuideV-256710CAT IILookup Service must record user access in a format that enables monitoring of remote access.VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation GuideV-256615CAT IIPerformance Charts must record user access in a format that enables monitoring of remote access.VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-256592CAT IIVMware Postgres log files must contain required fields.VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation GuideV-256749CAT IIThe Security Token Service must record user access in a format that enables monitoring of remote access.VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation GuideV-256782CAT IIvSphere UI must record user access in a format that enables monitoring of remote access.VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation GuideV-259006CAT IIThe vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation GuideV-259040CAT IIThe vCenter Lookup service must produce log records containing sufficient information regarding event details.VMware vSphere 8.0 vCenter Appliance Lookup Service Security Technical Implementation GuideV-259140CAT IIThe vCenter VAMI service must produce log records containing sufficient information to establish what type of events occurred.VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation GuideV-259074CAT IIThe vCenter Perfcharts service must produce log records containing sufficient information regarding event details.VMware vSphere 8.0 vCenter Appliance Perfcharts Security Technical Implementation GuideV-259171CAT IIThe vCenter PostgreSQL service must produce logs containing sufficient information to establish what type of events occurred.VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation GuideV-258974CAT IIThe vCenter STS service must produce log records containing sufficient information regarding event details.VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation GuideV-259107CAT IIThe vCenter UI service must produce log records containing sufficient information regarding event details.VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation GuideV-207465CAT IIThe VMM must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.Virtual Machine Manager Security Requirements GuideV-206426CAT IIThe web server must record time stamps for log records to a minimum granularity of one second.Web Server Security Requirements Guide