STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← CM-5 (1) — Access Restrictions for Change

CCI-003938

Definition

Automatically generate audit records of the enforcement actions.

Parent Control

CM-5 (1)Access Restrictions for ChangeConfiguration Management

Linked STIG Checks (98)

V-263530CAT IIAAA Services must be configured to automatically generate audit records of the enforcement actions.AAA Services Security Requirements GuideV-274017CAT IIAmazon Linux 2023 must have the audit package installed.Amazon Linux 2023 Security Technical Implementation GuideV-274018CAT IIAmazon Linux 2023 must produce audit records containing information to establish what type of events occurred.Amazon Linux 2023 Security Technical Implementation GuideV-268091CAT IINixOS must generate audit records for all usage of privileged commands.Anduril NixOS Security Technical Implementation GuideV-222997CAT IIAccessLogValve must be configured for Catalina engine.Apache Tomcat Application Server 9 Security Technical Implementation GuideV-268452CAT IIThe macOS system must be configured to audit all administrative action events.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268454CAT IIThe macOS system must enable security auditing.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268462CAT IIThe macOS system must be configured to audit all deletions of object attributes.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268463CAT IIThe macOS system must be configured to audit all changes of object attributes.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268464CAT IIThe macOS system must be configured to audit all failed read actions on the system.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268465CAT IIThe macOS system must be configured to audit all failed write actions on the system.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268470CAT IIThe macOS system must be configured to audit all authorization and authentication events.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-269094CAT IIThe macOS system must be configured to audit all failed program execution on the system.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277060CAT IIThe macOS system must be configured to audit all administrative action events.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277062CAT IIThe macOS system must enable security auditing.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277069CAT IIThe macOS system must be configured to audit all deletions of object attributes.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277070CAT IIThe macOS system must be configured to audit all changes of object attributes.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277071CAT IIThe macOS system must be configured to audit all failed read actions on the system.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277072CAT IIThe macOS system must be configured to audit all failed write actions on the system.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277073CAT IIThe macOS system must be configured to audit all failed program execution on the system.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277077CAT IIThe macOS system must be configured to audit all authorization and authentication events.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-222512CAT IIThe application must audit who makes configuration changes to the application.Application Security and Development Security Technical Implementation GuideV-204797CAT IIThe application server must log the enforcement actions used to restrict access associated with changes to the application server.Application Server Security Requirements GuideV-260590CAT IIUbuntu 22.04 LTS must have the "auditd" package installed.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-260591CAT IIUbuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-270656CAT IIUbuntu 24.04 LTS must have the "auditd" package installed.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-270657CAT IIUbuntu 24.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-263570CAT IIThe Central Log Server must automatically generate audit records of the enforcement actions.Central Log Server Security Requirements GuideV-271933CAT IIThe Cisco ACI must audit the enforcement actions used to restrict access associated with changes to the device.Cisco ACI NDM Security Technical Implementation GuideV-269469CAT IIThe audit package must be installed on AlmaLinux OS 9.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269532CAT IIThe auditd service must be enabled on AlmaLinux OS 9.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-233189CAT IIThe container platform must enforce access restrictions and support auditing of the enforcement actions.Container Platform Security Requirements GuideV-233547CAT IIPostgreSQL must produce audit records of its enforcement of access restrictions associated with changes to the configuration of PostgreSQL or database(s).Crunchy Data PostgreSQL Security Technical Implementation GuideV-206598CAT IIThe DBMS must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).Database Security Requirements GuideV-269774CAT IIThe Dell OS10 Switch must initiate session auditing upon startup.Dell OS10 Switch NDM Security Technical Implementation GuideV-263627CAT IIThe DNS server implementation must automatically generate audit records of the enforcement actions.Domain Name System (DNS) Security Requirements GuideV-259285CAT IIThe EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-278397CAT IINGINX must restrict access to configuration files.F5 NGINX Security Technical Implementation GuideV-230948CAT IIIForescout must audit the enforcement actions used to restrict access associated with changes to the device.Forescout Network Device Management Security Technical Implementation GuideV-203719CAT IIThe operating system must audit the enforcement actions used to restrict access associated with changes to the system.General Purpose Operating System Security Requirements GuideV-268282CAT IIThe HYCU virtual appliance must audit the enforcement actions used to restrict access associated with changes to the device.HYCU Protege Security Technical Implementation GuideV-215291CAT IIAIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.IBM AIX 7.x Security Technical Implementation GuideV-215314CAT IIAIX must be configured to use syslogd to log events by TCPD.IBM AIX 7.x Security Technical Implementation GuideV-215334CAT IAIX must disable trivial file transfer protocol.IBM AIX 7.x Security Technical Implementation GuideV-223544CAT IIIBM z/OS Required SMF data record types must be collected.IBM z/OS ACF2 Security Technical Implementation GuideV-223767CAT IIIBM z/OS required SMF data record types must be collected.IBM z/OS RACF Security Technical Implementation GuideV-223998CAT IIIBM z/OS required SMF data record types must be collected.IBM z/OS TSS Security Technical Implementation GuideV-258601CAT IIThe ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.Ivanti Connect Secure NDM Security Technical Implementation GuideV-213989CAT IISQL Server must produce audit records when attempts to modify SQL Server configuration and privileges occur within the database(s).MS SQL Server 2016 Instance Security Technical Implementation GuideV-205567CAT IIThe Mainframe Product must audit the enforcement actions used to restrict access associated with changes to the application.Mainframe Product Security Requirements GuideV-253733CAT IIMariaDB must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).MariaDB Enterprise 10.x Security Technical Implementation GuideV-220383CAT IIMarkLogic Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).MarkLogic Server v9 Security Technical Implementation GuideV-255345CAT IIAzure SQL Database must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Database(s).Microsoft Azure SQL Database Security Technical Implementation GuideV-259634CAT IIThe Exchange local machine policy must require signed scripts.Microsoft Exchange 2019 Edge Server Security Technical Implementation GuideV-259701CAT IIExchange software must be monitored for unauthorized changes.Microsoft Exchange 2019 Mailbox Server Security Technical Implementation GuideV-271351CAT IISQL Server must produce audit records when attempts to modify SQL Server configuration and privileges occur within the database(s).Microsoft SQL Server 2022 Instance Security Technical Implementation GuideV-253311CAT IIThe system must be configured to audit Detailed Tracking - PNP Activity successes.Microsoft Windows 11 Security Technical Implementation GuideV-253312CAT IIThe system must be configured to audit Detailed Tracking - Process Creation successes.Microsoft Windows 11 Security Technical Implementation GuideV-260909CAT IIMKE must be configured to integrate with an Enterprise Identity Provider.Mirantis Kubernetes Engine Security Technical Implementation GuideV-279334CAT IIMongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-202107CAT IIThe network device must audit the enforcement actions used to restrict access associated with changes to the device.Network Device Management Security Requirements GuideV-279565CAT IINutanix OS must have the audit.x86_64 package installed.Nutanix Acropolis GPOS Security Technical Implementation GuideV-221764CAT IIThe Oracle Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.Oracle Linux 7 Security Technical Implementation GuideV-248519CAT IIThe OL 8 audit package must be installed.Oracle Linux 8 Security Technical Implementation GuideV-248520CAT IIOL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.Oracle Linux 8 Security Technical Implementation GuideV-271519CAT IIOL 9 must have the audit package installed.Oracle Linux 9 Security Technical Implementation GuideV-271520CAT IIOL 9 audit service must be enabled.Oracle Linux 9 Security Technical Implementation GuideV-235170CAT IIThe MySQL Database Server 8.0 must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the MySQL Database Server 8.0 or database(s).Oracle MySQL 8.0 Security Technical Implementation GuideV-273788CAT IIThe RUCKUS ICX device must initiate session auditing upon startup.RUCKUS ICX NDM Security Technical Implementation GuideV-252843CAT IRancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation GuideV-254555CAT IIRancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.Rancher Government Solutions RKE2 Security Technical Implementation GuideV-280993CAT IIRHEL 10 must have the "audit" package installed.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-280994CAT IIRHEL 10 must enable the audit service.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-258151CAT IIRHEL 9 audit package must be installed.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-258152CAT IIRHEL 9 audit service must be enabled.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-257560CAT IIOpenShift must enforce access restrictions and support auditing of the enforcement actions.Red Hat OpenShift Container Platform 4.12 Security Technical Implementation GuideV-257560CAT IIOpenShift must enforce access restrictions and support auditing of the enforcement actions.Red Hat OpenShift Container Platform 4.x Security Technical Implementation GuideV-275677CAT IIUbuntu OS must have the "auditd" package installed.Riverbed NetIM OS Security Technical Implementation GuideV-275678CAT IIUbuntu OS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.Riverbed NetIM OS Security Technical Implementation GuideV-256072CAT IThe Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.Riverbed NetProfiler Security Technical Implementation GuideV-206744CAT IIThe SDN controller must be configured to audit the enforcement actions used to restrict access associated with changes to any application within the SDN framework.SDN Controller Security Requirements GuideV-217190CAT IIThe SUSE operating system must have the auditing package installed.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-217209CAT IIIThe SUSE operating system must generate audit records for all uses of the privileged functions.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-279252CAT IThe Edge SWG must be configured to send log data to at least one central log server for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).Symantec Edge SWG NDM Security Technical Implementation GuideV-253834CAT IIThe access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.Tanium 7.x Security Technical Implementation GuideV-253835CAT IIThe Tanium Server installer's account database permissions must be reduced to an appropriate level.Tanium 7.x Security Technical Implementation GuideV-242259CAT IThe TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).Trend Micro TippingPoint NDM Security Technical Implementation GuideV-252973CAT IITOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation GuideV-282437CAT IITOSS 5 audit package must be installed.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-282438CAT IITOSS 5 audit service must be enabled.Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation GuideV-234524CAT IIThe UEM server must audit the enforcement actions used to restrict access associated with changes to the application.Unified Endpoint Management Server Security Requirements GuideV-207471CAT IIThe VMM must audit the enforcement actions used to restrict access associated with changes to the system.Virtual Machine Manager Security Requirements GuideV-264341CAT IIThe web server must automatically generate audit records of the enforcement actions.Web Server Security Requirements GuideV-269583CAT IIXylok Security Suite must audit the enforcement actions used to restrict access associated with changes to it.Xylok Security Suite 20.x Security Technical Implementation GuideV-269586CAT IXylok Security Suite must use a central log server for auditing records.Xylok Security Suite 20.x Security Technical Implementation GuideV-224283CAT IICL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.z/OS CL/SuperSession for ACF2 Security Technical Implementation GuideV-224462CAT IICL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.z/OS CL/SuperSession for RACF Security Technical Implementation GuideV-224650CAT IICL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.z/OS CL/SuperSession for TSS Security Technical Implementation Guide