STIGhub
STIGs
RMF Controls
Compare
← AC-6 (9) — Least Privilege
CCI-002234
Definition
Log the execution of privileged functions.
Parent Control
AC-6 (9)
Least Privilege
Access Control
Linked STIG Checks (200)
V-76479
CAT II
The Akamai Luna Portal must audit the execution of privileged functions.
Akamai KSD Service Impact Level 2 NDM Security Technical Implementation Guide
V-274086
CAT II
Amazon Linux 2023 must audit uses of the "execve" system call.
Amazon Linux 2023 Security Technical Implementation Guide
V-268090
CAT II
The NixOS audit package must be installed.
Anduril NixOS Security Technical Implementation Guide
V-222985
CAT III
Application user name must be logged.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-252462
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257168
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-268452
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277060
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-222431
CAT II
The application must audit the execution of privileged functions.
Application Security and Development Security Technical Implementation Guide
V-204785
CAT II
The application server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
Application Server Security Requirements Guide
V-237323
CAT I
The ArcGIS Server must provide audit record generation capability for DoD-defined auditable events within all application components.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-255951
CAT II
The Arista network device must be configured to audit all administrator activity.
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
V-219281
CAT II
The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238304
CAT II
The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260648
CAT II
Ubuntu 22.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270689
CAT II
Ubuntu 24.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-271939
CAT II
The Cisco ACI must automatically audit account creation.
Cisco ACI NDM Security Technical Implementation Guide
V-239921
CAT II
The Cisco ASA must be configured to audit the execution of privileged functions.
Cisco ASA NDM Security Technical Implementation Guide
V-215670
CAT II
The Cisco device must be configured to audit all administrator activity.
Cisco IOS Router NDM Security Technical Implementation Guide
V-220578
CAT II
The Cisco device must be configured to audit all administrator activity.
Cisco IOS Switch NDM Security Technical Implementation Guide
V-215815
CAT II
The Cisco device must be configured to audit all administrator activity.
Cisco IOS XE Router NDM Security Technical Implementation Guide
V-220526
CAT II
The Cisco device must be configured to audit all administrator activity.
Cisco IOS XE Switch NDM Security Technical Implementation Guide
V-220495
CAT II
The Cisco switch must be configured to audit the execution of privileged functions.
Cisco NX OS Switch NDM Security Technical Implementation Guide
V-269146
CAT II
AlmaLinux OS 9 must audit uses of the "execve" system call.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269359
CAT II
AlmaLinux OS 9 must require users to provide authentication for privilege escalation.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269360
CAT II
AlmaLinux OS 9 must require users to provide a password for privilege escalation.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269361
CAT II
AlmaLinux OS 9 must not be configured to bypass password requirements for privilege escalation.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269362
CAT II
AlmaLinux OS 9 must require reauthentication when using the "sudo" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233164
CAT II
The container platform must audit the execution of privileged functions.
Container Platform Security Requirements Guide
V-255566
CAT II
The DBN-6300 must audit the execution of privileged functions.
DBN-6300 NDM Security Technical Implementation Guide
V-269774
CAT II
The Dell OS10 Switch must initiate session auditing upon startup.
Dell OS10 Switch NDM Security Technical Implementation Guide
V-235778
CAT II
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235779
CAT II
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235831
CAT II
An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-266068
CAT II
The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
V-234167
CAT II
The FortiGate device must audit the execution of privileged functions.
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
V-203697
CAT II
The operating system must audit the execution of privileged functions.
General Purpose Operating System Security Requirements Guide
V-266950
CAT II
AOS must audit the execution of privileged functions.
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
V-268226
CAT II
The HYCU virtual appliance must audit the execution of privileged functions.
HYCU Protege Security Technical Implementation Guide
V-215246
CAT II
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM AIX 7.x Security Technical Implementation Guide
V-65139
CAT II
The DataPower Gateway must audit the execution of privileged functions.
IBM DataPower Network Device Management Security Technical Implementation Guide
V-255784
CAT II
The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
V-250325
CAT II
The WebSphere Liberty Server must log remote session and security activity.
IBM WebSphere Liberty Server Security Technical Implementation Guide
V-255820
CAT II
The WebSphere Application Server security auditing must be enabled.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255821
CAT II
The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255822
CAT II
The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255823
CAT II
The WebSphere Application Server audit event type filters must be configured.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255824
CAT II
The WebSphere Application Server audit service provider must be enabled.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-223544
CAT II
IBM z/OS Required SMF data record types must be collected.
IBM z/OS ACF2 Security Technical Implementation Guide
V-255933
CAT II
IBM Integrated Crypto Service Facility (ICSF) install data sets must be properly protected.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223694
CAT II
IBM RACF OPERAUDIT SETROPTS value must set to OPERAUDIT.
IBM z/OS RACF Security Technical Implementation Guide
V-223767
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS RACF Security Technical Implementation Guide
V-223962
CAT II
CA-TSS ADMINBY Control Option must be set to ADMINBY.
IBM z/OS TSS Security Technical Implementation Guide
V-223963
CAT II
CA-TSS LOG Control Option must be set to (SMF,INIT, SEC9, MSG).
IBM z/OS TSS Security Technical Implementation Guide
V-223964
CAT II
CA-TSS MSCA ACID password changes must be documented in the change log.
IBM z/OS TSS Security Technical Implementation Guide
V-223998
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS TSS Security Technical Implementation Guide
V-259734
CAT II
The IBM Security zSecure programs CKFCOLL and CKGRACF, and the APF-authorized version of program CKRCARLA, must be restricted to security administrators, security batch jobs performing External Security Manager (ESM) maintenance, auditors, and systems programmers, and must be audited.
IBM zSecure Suite Security Technical Implementation Guide
V-258601
CAT II
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
Ivanti Connect Secure NDM Security Technical Implementation Guide
V-213540
CAT II
The JBoss server must be configured to log all admin activity.
JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
V-217330
CAT II
The Juniper router must be configured to audit the execution of privileged functions.
Juniper Router NDM Security Technical Implementation Guide
V-66551
CAT III
The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.
Juniper SRX SG NDM Security Technical Implementation Guide
V-223187
CAT III
The Juniper SRX Services Gateway must generate a log event when privileged commands are executed.
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
V-205546
CAT II
The Mainframe Product must audit the execution of privileged functions.
Mainframe Product Security Requirements Guide
V-220750
CAT II
The system must be configured to audit Account Management - Security Group Management successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220751
CAT II
The system must be configured to audit Account Management - User Account Management failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-220752
CAT II
The system must be configured to audit Account Management - User Account Management successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220768
CAT II
The system must be configured to audit Policy Change - Authentication Policy Change successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220770
CAT II
The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-220771
CAT II
The system must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220775
CAT II
The system must be configured to audit System - Security State Change successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220776
CAT II
The system must be configured to audit System - Security System Extension successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220777
CAT II
The system must be configured to audit System - System Integrity failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-220778
CAT II
The system must be configured to audit System - System Integrity successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-257589
CAT II
Windows 10 must have command line process auditing events enabled for failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-253328
CAT II
The system must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows 11 Security Technical Implementation Guide
V-257770
CAT II
Windows 11 must have command line process auditing events enabled for failures.
Microsoft Windows 11 Security Technical Implementation Guide
V-224883
CAT II
Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224888
CAT II
Windows Server 2016 must be configured to audit Detailed Tracking - Process Creation successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224900
CAT II
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224901
CAT II
Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224902
CAT II
Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224903
CAT II
Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224904
CAT II
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224905
CAT II
Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224906
CAT II
Windows Server 2016 must be configured to audit System - IPsec Driver successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224907
CAT II
Windows Server 2016 must be configured to audit System - IPsec Driver failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224908
CAT II
Windows Server 2016 must be configured to audit System - Other System Events successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224909
CAT II
Windows Server 2016 must be configured to audit System - Other System Events failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224910
CAT II
Windows Server 2016 must be configured to audit System - Security State Change successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224911
CAT II
Windows Server 2016 must be configured to audit System - Security System Extension successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224912
CAT II
Windows Server 2016 must be configured to audit System - System Integrity successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224913
CAT II
Windows Server 2016 must be configured to audit System - System Integrity failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224980
CAT II
Active Directory Group Policy objects must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224981
CAT II
The Active Directory Domain object must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224982
CAT II
The Active Directory Infrastructure object must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224983
CAT II
The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224984
CAT II
The Active Directory AdminSDHolder object must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224985
CAT II
The Active Directory RID Manager$ object must be configured with proper audit settings.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224987
CAT II
Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224988
CAT II
Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224989
CAT II
Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205769
CAT II
Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205770
CAT II
Windows Server 2019 must be configured to audit Detailed Tracking - Process Creation successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205771
CAT II
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205772
CAT II
Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205773
CAT II
Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205774
CAT II
Windows Server 2019 must be configured to audit Policy Change - Authorization Policy Change successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205775
CAT II
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205776
CAT II
Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205777
CAT II
Windows Server 2019 must be configured to audit System - IPsec Driver successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205778
CAT II
Windows Server 2019 must be configured to audit System - IPsec Driver failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205779
CAT II
Windows Server 2019 must be configured to audit System - Other System Events successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205780
CAT II
Windows Server 2019 must be configured to audit System - Other System Events failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205781
CAT II
Windows Server 2019 must be configured to audit System - Security State Change successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205782
CAT II
Windows Server 2019 must be configured to audit System - Security System Extension successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205783
CAT II
Windows Server 2019 must be configured to audit System - System Integrity successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205784
CAT II
Windows Server 2019 must be configured to audit System - System Integrity failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205785
CAT II
Windows Server 2019 Active Directory Group Policy objects must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205786
CAT II
Windows Server 2019 Active Directory Domain object must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205787
CAT II
Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205788
CAT II
Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205789
CAT II
Windows Server 2019 Active Directory AdminSDHolder object must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205790
CAT II
Windows Server 2019 Active Directory RID Manager$ object must be configured with proper audit settings.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205791
CAT II
Windows Server 2019 must be configured to audit DS Access - Directory Service Access successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205792
CAT II
Windows Server 2019 must be configured to audit DS Access - Directory Service Access failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205793
CAT II
Windows Server 2019 must be configured to audit DS Access - Directory Service Changes successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254302
CAT II
Windows Server 2022 must be configured to audit Account Management - Other Account Management Events successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254307
CAT II
Windows Server 2022 must be configured to audit Detailed Tracking - Process Creation successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254319
CAT II
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254320
CAT II
Windows Server 2022 must be configured to audit Policy Change - Audit Policy Change failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254321
CAT II
Windows Server 2022 must be configured to audit Policy Change - Authentication Policy Change successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254322
CAT II
Windows Server 2022 must be configured to audit Policy Change - Authorization Policy Change successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254323
CAT II
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254324
CAT II
Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254325
CAT II
Windows Server 2022 must be configured to audit System - IPsec Driver successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254326
CAT II
Windows Server 2022 must be configured to audit System - IPsec Driver failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254327
CAT II
Windows Server 2022 must be configured to audit System - Other System Events successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254328
CAT II
Windows Server 2022 must be configured to audit System - Other System Events failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254329
CAT II
Windows Server 2022 must be configured to audit System - Security State Change successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254330
CAT II
Windows Server 2022 must be configured to audit System - Security System Extension successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254331
CAT II
Windows Server 2022 must be configured to audit System - System Integrity successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254332
CAT II
Windows Server 2022 must be configured to audit System - System Integrity failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254401
CAT II
Windows Server 2022 Active Directory Group Policy objects must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254402
CAT II
Windows Server 2022 Active Directory Domain object must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254403
CAT II
Windows Server 2022 Active Directory Infrastructure object must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254404
CAT II
Windows Server 2022 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254405
CAT II
Windows Server 2022 Active Directory AdminSDHolder object must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254406
CAT II
Windows Server 2022 Active Directory RID Manager$ object must be configured with proper audit settings.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254408
CAT II
Windows Server 2022 must be configured to audit DS Access - Directory Service Access successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254409
CAT II
Windows Server 2022 must be configured to audit DS Access - Directory Service Access failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254410
CAT II
Windows Server 2022 must be configured to audit DS Access - Directory Service Changes successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278049
CAT II
Windows Server 2025 must be configured to audit Account Management - Other Account Management Events successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278054
CAT II
Windows Server 2025 must be configured to audit Detailed Tracking - Process Creation successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278066
CAT II
Windows Server 2025 must be configured to audit Policy Change - Audit Policy Change successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278067
CAT II
Windows Server 2025 must be configured to audit Policy Change - Audit Policy Change failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278068
CAT II
Windows Server 2025 must be configured to audit Policy Change - Authentication Policy Change successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278069
CAT II
Windows Server 2025 must be configured to audit Policy Change - Authorization Policy Change successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278070
CAT II
Windows Server 2025 must be configured to audit Privilege Use - Sensitive Privilege Use successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278071
CAT II
Windows Server 2025 must be configured to audit Privilege Use - Sensitive Privilege Use failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278072
CAT II
Windows Server 2025 must be configured to audit System - IPsec Driver successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278073
CAT II
Windows Server 2025 must be configured to audit System - IPsec Driver failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278074
CAT II
Windows Server 2025 must be configured to audit System - Other System Events successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278075
CAT II
Windows Server 2025 must be configured to audit System - Other System Events failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278076
CAT II
Windows Server 2025 must be configured to audit System - Security State Change successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278077
CAT II
Windows Server 2025 must be configured to audit System - Security System Extension successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278078
CAT II
Windows Server 2025 must be configured to audit System - System Integrity successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278079
CAT II
Windows Server 2025 must be configured to audit System - System Integrity failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278148
CAT II
Windows Server 2025 Active Directory Group Policy Objects (GPOs) must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278149
CAT II
Windows Server 2025 Active Directory (AD) Domain object must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278150
CAT II
Windows Server 2025 Active Directory (AD) Infrastructure object must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278151
CAT II
Windows Server 2025 Active Directory (AD) Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278152
CAT II
Windows Server 2025 Active Directory (AD) AdminSDHolder object must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278153
CAT II
Windows Server 2025 Active Directory (AD) RID Manager$ object must be configured with proper audit settings.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278155
CAT II
Windows Server 2025 must be configured to audit DS Access - Directory Service Access successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278156
CAT II
Windows Server 2025 must be configured to audit DS Access - Directory Service Access failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278157
CAT II
Windows Server 2025 must be configured to audit DS Access - Directory Service Changes successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278158
CAT II
Windows Server 2025 must be configured to audit DS Access - Directory Service Changes failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-260914
CAT II
Audit logging must be enabled on MKE.
Mirantis Kubernetes Engine Security Technical Implementation Guide
V-202094
CAT II
The network device must audit the execution of privileged functions.
Network Device Management Security Requirements Guide
V-254130
CAT II
Nutanix AOS must audit the execution of privileged functions.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279545
CAT II
Nutanix OS must audit the execution of privileged functions.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221777
CAT II
The Oracle Linux operating system must audit all executions of privileged functions.
Oracle Linux 7 Security Technical Implementation Guide
V-248722
CAT II
The OL 8 audit system must be configured to audit the execution of privileged functions and prevent all software from executing at higher privilege levels than users executing the software.
Oracle Linux 8 Security Technical Implementation Guide
V-271570
CAT II
OL 9 must audit uses of the execve system call.
Oracle Linux 9 Security Technical Implementation Guide
V-271724
CAT II
OL 9 must require users to reauthenticate for privilege escalation.
Oracle Linux 9 Security Technical Implementation Guide
V-271725
CAT II
OL 9 must require users to provide a password for privilege escalation.
Oracle Linux 9 Security Technical Implementation Guide
V-271726
CAT II
OL 9 must not be configured to bypass password requirements for privilege escalation.
Oracle Linux 9 Security Technical Implementation Guide
V-273788
CAT II
The RUCKUS ICX device must initiate session auditing upon startup.
RUCKUS ICX NDM Security Technical Implementation Guide
V-252844
CAT II
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
V-254555
CAT II
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
Rancher Government Solutions RKE2 Security Technical Implementation Guide
V-281116
CAT II
RHEL 10 must generate audit records for successful and unsuccessful uses of the "execve" system call.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-204516
CAT II
The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-258176
CAT II
RHEL 9 must audit uses of the "execve" system call.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-257560
CAT II
OpenShift must enforce access restrictions and support auditing of the enforcement actions.
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
V-275452
CAT I
The Riverbed NetIM must enable and configure user audit logging.
Riverbed NetIM NDM Security Technical Implementation Guide
V-275733
CAT II
Ubuntu OS must prevent all software from executing at higher privilege levels than users executing the software, and the audit system must be configured to audit the execution of privileged functions.
Riverbed NetIM OS Security Technical Implementation Guide
V-256072
CAT I
The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
Riverbed NetProfiler Security Technical Implementation Guide
V-254089
CAT II
Innoslate must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
SPEC Innovations Innoslate 4.x Security Technical Implementation Guide
V-261462
CAT II
SLEM 5 must generate audit records for all uses of privileged functions.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217209
CAT III
The SUSE operating system must generate audit records for all uses of the privileged functions.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide