| STIG ID | Version | Title | Product |
|---|---|---|---|
| ALMA-09-045780 | V1R4 | AlmaLinux OS 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access. | AlmaLinux OS 9 |
| ALMA-09-045890 | V1R4 | AlmaLinux OS 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | AlmaLinux OS 9 |
| OL08-00-030610 | V2R6 | OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Oracle Linux 8 |
| OL09-00-000805 | V1R3 | OL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Oracle Linux 9 |
| OL09-00-000810 | V1R3 | OL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access. | Oracle Linux 9 |
| RHEL-08-030610 | V2R5 | RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Red Hat Enterprise Linux 8 |
| RHEL-09-653110 | V2R6 | RHEL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Red Hat Enterprise Linux 9 |
| TOSS-04-030550 | V2R3 | TOSS must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Tri-Lab Operating System Stack |
| UBTU-18-010311 | V2R15 | The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users. | Ubuntu 18.04 |
| UBTU-18-010312 | V2R15 | The Ubuntu operating system must permit only authorized accounts to own the audit configuration files. | Ubuntu 18.04 |
| UBTU-18-010313 | V2R15 | The Ubuntu operating system must permit only authorized groups to own the audit configuration files. | Ubuntu 18.04 |
| UBTU-20-010133 | V2R3 | The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users. | Ubuntu 20.04 |
| UBTU-20-010134 | V2R3 | The Ubuntu operating system must permit only authorized accounts to own the audit configuration files. | Ubuntu 20.04 |
| UBTU-20-010135 | V2R3 | The Ubuntu operating system must permit only authorized groups to own the audit configuration files. | Ubuntu 20.04 |
| UBTU-22-653065 | V2R6 | Ubuntu 22.04 LTS must be configured so that audit configuration files are not write-accessible by unauthorized users. | Ubuntu 22.04 |
| UBTU-22-653070 | V2R6 | Ubuntu 22.04 LTS must permit only authorized accounts to own the audit configuration files. | Ubuntu 22.04 |
| UBTU-22-653075 | V2R6 | Ubuntu 22.04 LTS must permit only authorized groups to own the audit configuration files. | Ubuntu 22.04 |
| UBTU-24-900040 | V1R1 | Ubuntu 24.04 LTS must be configured so that audit configuration files are not write-accessible by unauthorized users. | Ubuntu 24.04 |
| UBTU-24-900050 | V1R1 | Ubuntu 24.04 LTS must permit only authorized accounts to own the audit configuration files. | Ubuntu 24.04 |
| UBTU-24-900060 | V1R1 | Ubuntu 24.04 LTS must permit only authorized groups to own the audit configuration files. | Ubuntu 24.04 |