STIGhub
STIGs
RMF Controls
Compare
← All Controls
AU-8
Audit and Accountability
Rev 5
Time Stamps
CCI Identifiers (4)
CCI-000159
Use internal system clocks to generate time stamps for audit records.
CCI-001888
Defines the granularity of time measurement for time stamps generated for audit records.
CCI-001889
Record time stamps for audit records that meet organization-defined granularity of time measurement.
CCI-001890
Record time stamps for audit records that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or that include the local time offset as part of the time stamp.
Linked STIG Checks (190)
Across 113 STIGs. Click to expand.
▶
A10 Networks ADC NDM Security Technical Implementation Guide
1 check
▶
AAA Services Security Requirements Guide
3 checks
▶
Adobe ColdFusion Security Technical Implementation Guide
1 check
▶
Amazon Linux 2023 Security Technical Implementation Guide
4 checks
▶
Anduril NixOS Security Technical Implementation Guide
3 checks
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 Windows Server Security Technical Implementation Guide
1 check
▶
Apple macOS 12 (Monterey) Security Technical Implementation Guide
1 check
▶
Apple macOS 13 (Ventura) Security Technical Implementation Guide
1 check
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
1 check
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
3 checks
▶
Application Server Security Requirements Guide
3 checks
▶
Arista MLS DCS-7000 Series NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x NDM Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X NDM Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
2 checks
▶
CA API Gateway NDM Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
1 check
▶
Central Log Server Security Requirements Guide
3 checks
▶
Cisco ACI NDM Security Technical Implementation Guide
1 check
▶
Cisco ASA NDM Security Technical Implementation Guide
2 checks
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XR Router NDM Security Technical Implementation Guide
2 checks
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cisco NX OS Switch NDM Security Technical Implementation Guide
1 check
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
5 checks
▶
Container Platform Security Requirements Guide
3 checks
▶
Crunchy Data Postgres 16 Security Technical Implementation Guide
2 checks
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
2 checks
▶
Database Security Requirements Guide
3 checks
▶
DBN-6300 NDM Security Technical Implementation Guide
3 checks
▶
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
2 checks
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT NDM Security Technical Implementation Guide
1 check
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
3 checks
▶
HP FlexFabric Switch NDM Security Technical Implementation Guide
3 checks
▶
HPE 3PAR StoreServ 3.2.x Security Technical Implementation Guide
1 check
▶
HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide
1 check
▶
HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
Ivanti Connect Secure NDM Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide
1 check
▶
Juniper Router NDM Security Technical Implementation Guide
1 check
▶
Juniper SRX Services Gateway NDM Security Technical Implementation Guide
1 check
▶
Juniper SRX SG NDM Security Technical Implementation Guide
1 check
▶
Mainframe Product Security Requirements Guide
1 check
▶
MariaDB Enterprise 10.x Security Technical Implementation Guide
1 check
▶
Microsoft SQL Server 2022 Instance Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Database Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Instance Security Technical Implementation Guide
1 check
▶
MS SQL Server 2016 Instance Security Technical Implementation Guide
1 check
▶
NetApp ONTAP DSC 9.x Security Technical Implementation Guide
1 check
▶
Network Device Management Security Requirements Guide
3 checks
▶
Nutanix Acropolis Application Server Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis GPOS Security Technical Implementation Guide
2 checks
▶
Nutanix AOS 5.20.x Application Security Technical Implementation Guide
1 check
▶
Oracle Linux 8 Security Technical Implementation Guide
3 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
3 checks
▶
Oracle WebLogic Server 12c Security Technical Implementation Guide
1 check
▶
Palo Alto Networks NDM Security Technical Implementation Guide
1 check
▶
PostgreSQL 9.x Security Technical Implementation Guide
2 checks
▶
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
1 check
▶
Rancher Government Solutions RKE2 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
3 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
3 checks
▶
Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
2 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
2 checks
▶
Redis Enterprise 6.x Security Technical Implementation Guide
1 check
▶
Riverbed NetIM OS Security Technical Implementation Guide
1 check
▶
Riverbed NetProfiler Security Technical Implementation Guide
2 checks
▶
RUCKUS ICX NDM Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
2 checks
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
3 checks
▶
Trend Micro TippingPoint NDM Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
3 checks
▶
Unified Endpoint Management Server Security Requirements Guide
3 checks
▶
Virtual Machine Manager Security Requirements Guide
3 checks
▶
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
1 check
▶
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide
3 checks
▶
VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide
3 checks
▶
VMware NSX 4.x Manager NDM Security Technical Implementation Guide
1 check
▶
VMware NSX-T Manager NDM Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
2 checks
▶
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
6 checks
▶
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
6 checks
▶
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
2 checks
▶
VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation Guide
1 check
▶
Web Server Security Requirements Guide
3 checks