STIGhub
STIGs
RMF Controls
Compare
← All Controls
AU-9 (2)
Audit and Accountability
Rev 5
Protection of Audit Information
CCI Identifiers (3)
CCI-001348
Store audit records on an organization-defined frequency in a repository that is part of a physically different system or system component than the system or component being audited.
CCI-001349
Defines a frequency for storing audit records in a repository that is part of a physically different system or system component than the system or component being audited.
CCI-001575
The organization defines the system or system component for storing audit records that is a different system or system component than the system or component being audited.
Linked STIG Checks (71)
Across 67 STIGs. Click to expand.
▶
A10 Networks ADC NDM Security Technical Implementation Guide
1 check
▶
Adobe ColdFusion Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 Windows Server Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Application Server Security Requirements Guide
1 check
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
BIND 9.x Security Technical Implementation Guide
4 checks
▶
CA API Gateway NDM Security Technical Implementation Guide
1 check
▶
Central Log Server Security Requirements Guide
2 checks
▶
DBN-6300 NDM Security Technical Implementation Guide
1 check
▶
Domain Name System (DNS) Security Requirements Guide
1 check
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
ForeScout CounterACT NDM Security Technical Implementation Guide
1 check
▶
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
1 check
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) STIG
1 check
▶
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide
1 check
▶
Infoblox 7.x DNS Security Technical Implementation Guide
1 check
▶
Infoblox 8.x DNS Security Technical Implementation Guide
1 check
▶
ISEC7 Sphere Security Technical Implementation Guide
1 check
▶
Ivanti EPMM Server Security Technical Implementation Guide
1 check
▶
Ivanti MobileIron Core MDM Server Security Technical Implementation Guide
1 check
▶
JBoss Enterprise Application Platform 6.3 Security Technical Implementation Guide
1 check
▶
Microsoft Defender for Endpoint Security Technical Implementation Guide
1 check
▶
Microsoft Entra ID Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft IIS 10.0 Server Security Technical Implementation Guide
1 check
▶
Microsoft Intune MDM Service Desktop & Mobile Security Technical Implementation Guide
1 check
▶
Microsoft Intune MDM Service Desktop & Mobile Security Technical Implementation Guide
1 check
▶
Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
1 check
▶
Network Infrastructure Policy Security Technical Implementation Guide
1 check
▶
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide
1 check
▶
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
1 check
▶
SEL-2740S NDM Security Technical Implementation Guide
1 check
▶
Solaris 11 SPARC Security Technical Implementation Guide
1 check
▶
Solaris 11 X86 Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide
1 check
▶
Symantec ProxySG NDM Security Technical Implementation Guide
1 check
▶
Tanium 7.x Operating System on TanOS Security Technical Implementation Guide
1 check
▶
Trend Micro Deep Security 9.x Security Technical Implementation Guide
1 check
▶
Unified Endpoint Management Server Security Requirements Guide
1 check
▶
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
1 check
▶
VMware NSX Manager Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Envoy Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation Guide
1 check
▶
Web Server Security Requirements Guide
1 check
▶
Xylok Security Suite 20.x Security Technical Implementation Guide
1 check