STIGhub
STIGs
RMF Controls
Compare
← All Controls
AU-3 (2)
Audit and Accountability
Rev 3
Content of Audit Records
CCI Identifiers (6)
CCI-000136
The organization centrally manages the content of audit records generated by organization-defined information system components.
CCI-001489
The organization defines information system components for which generated audit records are centrally managed by the organization.
CCI-001844
The information system provides centralized management and configuration of the content to be captured in audit records generated by organization-defined information system components.
CCI-001845
The information system provides centralized configuration of the content to be captured in audit records generated by organization-defined information system components.
deprecated
CCI-001846
The organization defines information system components that will generate the audit records which are to be captured for centralized management of the content.
CCI-001847
The organization defines information system components that will generate the audit records which are to be captured for centralized configuration of the content.
Linked STIG Checks (33)
Across 26 STIGs. Click to expand.
▶
Crunchy Data Postgres 16 Security Technical Implementation Guide
1 check
▶
DBN-6300 IDPS Security Technical Implementation Guide
1 check
▶
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
2 checks
▶
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
2 checks
▶
IBM Aspera Platform 4.2 Security Technical Implementation Guide
1 check
▶
IBM DataPower ALG Security Technical Implementation Guide
1 check
▶
IBM DB2 V10.5 LUW Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
1 check
▶
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
1 check
▶
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
1 check
▶
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide
2 checks
▶
MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide
2 checks
▶
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Instance Security Technical Implementation Guide
1 check
▶
PostgreSQL 9.x Security Technical Implementation Guide
1 check
▶
SDN Using NV Security Technical Implementation Guide
1 check
▶
SPEC Innovations Innoslate 4.x Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
2 checks
▶
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide
2 checks
▶
VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide
2 checks
▶
VMware NSX-T Distributed Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier 1 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway Firewall Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
1 check