STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AU-10 (1) — Non-Repudiation

CCI-001902

Definition

Provide the means for authorized individuals to determine the identity of the producer of the information.

Parent Control

AU-10 (1)Non-RepudiationAudit and Accountability

Linked STIG Checks (8)

V-272417CAT IA BIND 9.x server implementation must maintain the integrity and confidentiality of DNS information while it is being prepared for transmission, in transmission, and in use and must perform integrity verification and data origin verification for all DNS information.BIND 9.x Security Technical Implementation GuideV-265982CAT IIAn authoritative name server must be configured to enable DNSSEC Resource Records.F5 BIG-IP TMOS DNS Security Technical Implementation GuideV-214182CAT IIThe Infoblox system must be configured to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.Infoblox 7.x DNS Security Technical Implementation GuideV-233890CAT IIThe Infoblox system must provide the means for authorized individuals to determine the identity of the source of the DNS service member-provided information.Infoblox 8.x DNS Security Technical Implementation GuideV-215648CAT IIThe Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.Microsoft Windows 2012 Server Domain Name System Security Technical Implementation GuideV-259335CAT IIThe Windows DNS Server must be configured to record who added/modified/deleted DNS zone information.Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation GuideV-251361CAT IIDynamic Host Configuration Protocol (DHCP) audit and event logs must record sufficient forensic data to be stored online for thirty days and offline for one year.Network Infrastructure Policy Security Technical Implementation GuideV-251362CAT IIIDynamic Host Configuration Protocol (DHCP) servers used within SIPRNet infrastructure must be configured with a minimum lease duration time of 30 days.Network Infrastructure Policy Security Technical Implementation Guide