STIGhub
STIGs
RMF Controls
Compare
← All Controls
AU-12 (3)
Audit and Accountability
Rev 5
Audit Record Generation
CCI Identifiers (6)
CCI-001911
Defines the selectable event criteria to be used as the basis for changes to the auditing to be performed on organization-defined system components, by organization-defined individuals or roles, within organization-defined time thresholds.
CCI-001912
Defines the time thresholds for organization-defined individuals or roles to change the auditing to be performed based on organization-defined selectable event criteria.
CCI-001913
Defines the individuals or roles that are to be provided the capability to change the auditing to be performed based on organization-defined selectable event criteria, within organization-defined time thresholds.
CCI-001914
Provide the capability for organization-defined individuals or roles to change the logging to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds.
CCI-002047
Defines the system components on which the auditing that is to be performed can be changed by organization-defined individuals or roles.
CCI-003834
Implement the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined system components based on organization-defined selectable event criteria within organization-defined time thresholds.
Linked STIG Checks (52)
Across 39 STIGs. Click to expand.
▶
Amazon Linux 2023 Security Technical Implementation Guide
2 checks
▶
Apple macOS 12 (Monterey) Security Technical Implementation Guide
1 check
▶
Apple macOS 13 (Ventura) Security Technical Implementation Guide
1 check
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
1 check
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
2 checks
▶
Central Log Server Security Requirements Guide
3 checks
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
2 checks
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
1 check
▶
DBN-6300 NDM Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT NDM Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
IBM z/OS ACF2 Security Technical Implementation Guide
1 check
▶
IBM z/OS RACF Security Technical Implementation Guide
1 check
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check
▶
Microsoft Windows 10 Security Technical Implementation Guide
1 check
▶
Microsoft Windows 11 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2016 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2019 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2022 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
1 check
▶
Oracle Linux 8 Security Technical Implementation Guide
2 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
2 checks
▶
Riverbed NetIM OS Security Technical Implementation Guide
2 checks
▶
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
2 checks
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
2 checks
▶
Virtual Machine Manager Security Requirements Guide
1 check
▶
VMware NSX Manager Security Technical Implementation Guide
1 check
▶
Xylok Security Suite 20.x Security Technical Implementation Guide
1 check