STIGhub
STIGs
RMF Controls
Compare
← MA-4 (1) — Nonlocal Maintenance
CCI-002884
Definition
Log organization-defined audit events for nonlocal maintenance and diagnostic sessions.
Parent Control
MA-4 (1)
Nonlocal Maintenance
Maintenance
Linked STIG Checks (200)
V-274017
CAT II
Amazon Linux 2023 must have the audit package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274018
CAT II
Amazon Linux 2023 must produce audit records containing information to establish what type of events occurred.
Amazon Linux 2023 Security Technical Implementation Guide
V-274081
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Amazon Linux 2023 Security Technical Implementation Guide
V-274082
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Amazon Linux 2023 Security Technical Implementation Guide
V-274083
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Amazon Linux 2023 Security Technical Implementation Guide
V-274084
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Amazon Linux 2023 Security Technical Implementation Guide
V-274085
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274087
CAT II
Amazon Linux 2023 must audit all uses of the chmod, fchmod, and fchmodat system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274088
CAT II
Amazon Linux 2023 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274089
CAT II
Amazon Linux 2023 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274090
CAT II
Amazon Linux 2023 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274091
CAT II
Amazon Linux 2023 must audit all uses of the init_module and finit_module system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274092
CAT II
Amazon Linux 2023 must audit all uses of the create_module system call.
Amazon Linux 2023 Security Technical Implementation Guide
V-274093
CAT II
Amazon Linux 2023 must audit all uses of the kmod command.
Amazon Linux 2023 Security Technical Implementation Guide
V-274094
CAT II
Amazon Linux 2023 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
Amazon Linux 2023 Security Technical Implementation Guide
V-274095
CAT II
Amazon Linux 2023 must audit all uses of the chcon command.
Amazon Linux 2023 Security Technical Implementation Guide
V-274096
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
Amazon Linux 2023 Security Technical Implementation Guide
V-274097
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
Amazon Linux 2023 Security Technical Implementation Guide
V-274104
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274105
CAT II
Amazon Linux 2023 must audit all successful/unsuccessful uses of the chage command.
Amazon Linux 2023 Security Technical Implementation Guide
V-274112
CAT II
Amazon Linux 2023 must audit all uses of the sudo command.
Amazon Linux 2023 Security Technical Implementation Guide
V-274113
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Amazon Linux 2023 Security Technical Implementation Guide
V-274114
CAT II
Amazon Linux 2023 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Amazon Linux 2023 Security Technical Implementation Guide
V-274167
CAT II
Amazon Linux 2023 must enable auditing of processes that start prior to the audit daemon.
Amazon Linux 2023 Security Technical Implementation Guide
V-268091
CAT II
NixOS must generate audit records for all usage of privileged commands.
Anduril NixOS Security Technical Implementation Guide
V-252462
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257168
CAT II
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-268452
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268453
CAT II
The macOS system must be configured to audit all login and logout events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268454
CAT II
The macOS system must enable security auditing.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268462
CAT II
The macOS system must be configured to audit all deletions of object attributes.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268463
CAT II
The macOS system must be configured to audit all changes of object attributes.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268464
CAT II
The macOS system must be configured to audit all failed read actions on the system.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268465
CAT II
The macOS system must be configured to audit all failed write actions on the system.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-268470
CAT II
The macOS system must be configured to audit all authorization and authentication events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277060
CAT II
The macOS system must be configured to audit all administrative action events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277061
CAT II
The macOS system must be configured to audit all login and logout events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277062
CAT II
The macOS system must enable security auditing.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277069
CAT II
The macOS system must be configured to audit all deletions of object attributes.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277070
CAT II
The macOS system must be configured to audit all changes of object attributes.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277071
CAT II
The macOS system must be configured to audit all failed read actions on the system.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277072
CAT II
The macOS system must be configured to audit all failed write actions on the system.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-277077
CAT II
The macOS system must be configured to audit all authorization and authentication events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-222561
CAT II
Applications used for non-local maintenance sessions must audit non-local maintenance and diagnostic sessions for organization-defined auditable events.
Application Security and Development Security Technical Implementation Guide
V-219225
CAT II
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238309
CAT II
The Ubuntu operating system must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260649
CAT II
Ubuntu 22.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270740
CAT II
Ubuntu 24.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions, and other system-level access.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-269129
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269130
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269131
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269132
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269133
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269134
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269135
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect the files within /etc/sudoers.d/
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269467
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269469
CAT II
The audit package must be installed on AlmaLinux OS 9.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269470
CAT II
AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269471
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "mount" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269472
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "umount" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269473
CAT II
Successful/unsuccessful uses of the umount2 system call in AlmaLinux OS 9 must generate an audit record.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269474
CAT II
AlmaLinux OS 9 must enable auditing of processes that start prior to the audit daemon.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269475
CAT II
AlmaLinux OS 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269476
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "chacl" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269477
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "chage" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269478
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "chcon" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269479
CAT II
AlmaLinux OS 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269480
CAT II
AlmaLinux OS 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269481
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "chsh" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269482
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "crontab" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269483
CAT II
AlmaLinux OS 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269485
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "gpasswd" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269486
CAT II
AlmaLinux OS 9 must audit all uses of the kmod command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269487
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "newgrp" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269488
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "passwd" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269489
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "postdrop" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269490
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "postqueue" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269491
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "su" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269492
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "sudo" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269493
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "semanage" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269494
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "setfacl" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269495
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "setfiles" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269496
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "setsebool" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269497
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "ssh-agent" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269498
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "ssh-keysign" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269499
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "sudoedit" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269500
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "pam_timestamp_check" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269501
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "unix_chkpwd" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269502
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "unix_update" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269503
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "userhelper" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269504
CAT II
AlmaLinux OS 9 must generate audit records for any use of the "usermod" command.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269505
CAT II
AlmaLinux OS 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269532
CAT II
The auditd service must be enabled on AlmaLinux OS 9.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-233206
CAT II
The container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance.
Container Platform Security Requirements Guide
V-203735
CAT II
The operating system must audit all activities performed during nonlocal maintenance and diagnostic sessions.
General Purpose Operating System Security Requirements Guide
V-255249
CAT III
SSMC must provide audit record generation capability for DOD-defined auditable events for all operating system components.
HPE 3PAR SSMC Operating System Security Technical Implementation Guide
V-215246
CAT II
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM AIX 7.x Security Technical Implementation Guide
V-223517
CAT II
IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223544
CAT II
IBM z/OS Required SMF data record types must be collected.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223586
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223609
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223653
CAT II
IBM RACF SETROPTS LOGOPTIONS must be properly configured.
IBM z/OS RACF Security Technical Implementation Guide
V-223733
CAT II
IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
IBM z/OS RACF Security Technical Implementation Guide
V-223759
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
IBM z/OS RACF Security Technical Implementation Guide
V-223767
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS RACF Security Technical Implementation Guide
V-223806
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS RACF Security Technical Implementation Guide
V-223974
CAT II
IBM z/OS SMF recording options for the FTP server must be configured to write SMF records for all eligible events.
IBM z/OS TSS Security Technical Implementation Guide
V-223998
CAT II
IBM z/OS required SMF data record types must be collected.
IBM z/OS TSS Security Technical Implementation Guide
V-224054
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS TSS Security Technical Implementation Guide
V-224066
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet server must be properly specified.
IBM z/OS TSS Security Technical Implementation Guide
V-205578
CAT II
Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.
Mainframe Product Security Requirements Guide
V-254223
CAT II
Nutanix AOS must audit all activities performed during nonlocal maintenance and diagnostic sessions.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279614
CAT II
Nutanix OS must audit all activities performed during nonlocal maintenance and diagnostic sessions.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221792
CAT II
The Oracle Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
Oracle Linux 7 Security Technical Implementation Guide
V-221797
CAT II
The Oracle Linux operating system must audit all uses of the semanage command.
Oracle Linux 7 Security Technical Implementation Guide
V-221798
CAT II
The Oracle Linux operating system must audit all uses of the setsebool command.
Oracle Linux 7 Security Technical Implementation Guide
V-221799
CAT II
The Oracle Linux operating system must audit all uses of the chcon command.
Oracle Linux 7 Security Technical Implementation Guide
V-221800
CAT II
The Oracle Linux operating system must audit all uses of the setfiles command.
Oracle Linux 7 Security Technical Implementation Guide
V-221801
CAT II
The Oracle Linux operating system must generate audit records for all unsuccessful account access events.
Oracle Linux 7 Security Technical Implementation Guide
V-221802
CAT II
The Oracle Linux operating system must generate audit records for all successful account access events.
Oracle Linux 7 Security Technical Implementation Guide
V-221813
CAT II
The Oracle Linux operating system must audit all uses of the mount command and syscall.
Oracle Linux 7 Security Technical Implementation Guide
V-221833
CAT II
The Oracle Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
Oracle Linux 7 Security Technical Implementation Guide
V-248519
CAT II
The OL 8 audit package must be installed.
Oracle Linux 8 Security Technical Implementation Guide
V-248520
CAT II
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
Oracle Linux 8 Security Technical Implementation Guide
V-248740
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
Oracle Linux 8 Security Technical Implementation Guide
V-248741
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
Oracle Linux 8 Security Technical Implementation Guide
V-248742
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
Oracle Linux 8 Security Technical Implementation Guide
V-248743
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
Oracle Linux 8 Security Technical Implementation Guide
V-248744
CAT II
OL 8 must generate audit records for all account creation events that affect "/etc/group".
Oracle Linux 8 Security Technical Implementation Guide
V-248745
CAT II
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
Oracle Linux 8 Security Technical Implementation Guide
V-248746
CAT II
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
Oracle Linux 8 Security Technical Implementation Guide
V-248747
CAT II
OL 8 must generate audit records for any use of the "su" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248748
CAT II
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248753
CAT II
OL 8 must generate audit records for any use of the "chage" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248754
CAT II
OL 8 must generate audit records for any uses of the "chcon" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248756
CAT II
OL 8 must generate audit records for any use of the "ssh-agent" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248757
CAT II
OL 8 must generate audit records for any use of the "passwd" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248758
CAT II
OL 8 must generate audit records for any use of the "mount" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248759
CAT II
OL 8 must generate audit records for any use of the "umount" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248760
CAT II
OL 8 must generate audit records for any use of the "mount" syscall.
Oracle Linux 8 Security Technical Implementation Guide
V-248761
CAT II
OL 8 must generate audit records for any use of the "unix_update" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248762
CAT II
OL 8 must generate audit records for any use of the "postdrop" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248763
CAT II
OL 8 must generate audit records for any use of the "postqueue" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248767
CAT II
OL 8 must generate audit records for any use of the "setsebool" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248768
CAT II
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248769
CAT II
OL 8 must generate audit records for any use of the "ssh-keysign" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248770
CAT II
OL 8 must generate audit records for any use of the "setfacl" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248771
CAT II
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248772
CAT II
OL 8 must generate audit records for any use of the "newgrp" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248773
CAT II
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248774
CAT II
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248779
CAT II
OL 8 must generate audit records for any use of the "gpasswd" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248781
CAT II
OL 8 must generate audit records for any use of the delete_module syscall.
Oracle Linux 8 Security Technical Implementation Guide
V-248782
CAT II
OL 8 must generate audit records for any use of the "crontab" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248783
CAT II
OL 8 must generate audit records for any use of the "chsh" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248784
CAT II
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248790
CAT II
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248791
CAT II
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
Oracle Linux 8 Security Technical Implementation Guide
V-248797
CAT II
OL 8 must generate audit records for any use of the "sudo" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248798
CAT II
OL 8 must generate audit records for any use of the "usermod" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248799
CAT II
OL 8 must generate audit records for any use of the "chacl" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248800
CAT II
OL 8 must generate audit records for any use of the "kmod" command.
Oracle Linux 8 Security Technical Implementation Guide
V-248801
CAT II
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
Oracle Linux 8 Security Technical Implementation Guide
V-248802
CAT II
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
Oracle Linux 8 Security Technical Implementation Guide
V-248803
CAT II
OL 8 must enable auditing of processes that start prior to the audit daemon.
Oracle Linux 8 Security Technical Implementation Guide
V-248804
CAT III
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
Oracle Linux 8 Security Technical Implementation Guide
V-271519
CAT II
OL 9 must have the audit package installed.
Oracle Linux 9 Security Technical Implementation Guide
V-271520
CAT II
OL 9 audit service must be enabled.
Oracle Linux 9 Security Technical Implementation Guide
V-271527
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
Oracle Linux 9 Security Technical Implementation Guide
V-271528
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
Oracle Linux 9 Security Technical Implementation Guide
V-271529
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
Oracle Linux 9 Security Technical Implementation Guide
V-271530
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Oracle Linux 9 Security Technical Implementation Guide
V-271531
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
Oracle Linux 9 Security Technical Implementation Guide
V-271532
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
Oracle Linux 9 Security Technical Implementation Guide
V-271533
CAT II
OL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Oracle Linux 9 Security Technical Implementation Guide
V-271534
CAT II
OL 9 must audit all uses of the unix_update command.
Oracle Linux 9 Security Technical Implementation Guide
V-271535
CAT II
OL 9 must audit all uses of the su command.
Oracle Linux 9 Security Technical Implementation Guide
V-271536
CAT II
OL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
Oracle Linux 9 Security Technical Implementation Guide
V-271537
CAT II
OL 9 must audit all uses of the chage command.
Oracle Linux 9 Security Technical Implementation Guide
V-271538
CAT II
OL 9 must audit all uses of the chcon command.
Oracle Linux 9 Security Technical Implementation Guide
V-271539
CAT II
OL 9 must audit all uses of the setfacl command.
Oracle Linux 9 Security Technical Implementation Guide
V-271540
CAT II
OL 9 must audit all uses of the chsh command.
Oracle Linux 9 Security Technical Implementation Guide
V-271541
CAT II
OL 9 must audit all uses of the crontab command.
Oracle Linux 9 Security Technical Implementation Guide
V-271542
CAT II
OL 9 must audit all uses of the gpasswd command.
Oracle Linux 9 Security Technical Implementation Guide
V-271543
CAT II
OL 9 must audit all uses of the newgrp command.
Oracle Linux 9 Security Technical Implementation Guide
V-271544
CAT II
OL 9 must audit all uses of the pam_timestamp_check command.
Oracle Linux 9 Security Technical Implementation Guide
V-271545
CAT II
OL 9 must audit all uses of the passwd command.
Oracle Linux 9 Security Technical Implementation Guide
V-271546
CAT II
OL 9 must audit all uses of the postdrop command.
Oracle Linux 9 Security Technical Implementation Guide
V-271547
CAT II
OL 9 must audit all uses of the postqueue command.
Oracle Linux 9 Security Technical Implementation Guide
V-271548
CAT II
OL 9 must audit all uses of the ssh-agent command.
Oracle Linux 9 Security Technical Implementation Guide
V-271549
CAT II
OL 9 must audit all uses of the ssh-keysign command.
Oracle Linux 9 Security Technical Implementation Guide
V-271550
CAT II
OL 9 must audit all uses of the sudoedit command.
Oracle Linux 9 Security Technical Implementation Guide
V-271551
CAT II
OL 9 must audit all uses of the unix_chkpwd command.
Oracle Linux 9 Security Technical Implementation Guide
V-271552
CAT II
OL 9 must audit all uses of the userhelper command.
Oracle Linux 9 Security Technical Implementation Guide
V-271553
CAT II
OL 9 must audit all uses of the mount command.
Oracle Linux 9 Security Technical Implementation Guide
V-271554
CAT II
OL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
Oracle Linux 9 Security Technical Implementation Guide
V-271555
CAT II
OL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
Oracle Linux 9 Security Technical Implementation Guide
V-271556
CAT II
OL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
Oracle Linux 9 Security Technical Implementation Guide
V-271557
CAT II
OL 9 must audit all uses of the semanage command.
Oracle Linux 9 Security Technical Implementation Guide
V-271558
CAT II
OL 9 must audit all uses of the setfiles command.
Oracle Linux 9 Security Technical Implementation Guide