💼 AU-9(7) Protection of Audit Information | Store on Component with Different Operating System
- ID:
/frameworks/nist-sp-800-53-r5/au/09/07
Description​
Store audit information on a component running a different operating system than the system or component being audited.
Similar​
- Sections
/frameworks/aws-fsbp-v1.0.0/codebuild/04
/frameworks/aws-fsbp-v1.0.0/ec2/51
/frameworks/aws-fsbp-v1.0.0/eks/08
/frameworks/aws-fsbp-v1.0.0/neptune/02
/frameworks/aws-fsbp-v1.0.0/network-firewall/02
/frameworks/aws-fsbp-v1.0.0/transfer-family/03
- Internal
- ID:
dec-c-2e99d19a
- ID:
Similar Sections (Take Policies From)​
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [CodeBuild.4] CodeBuild project environments should have a logging AWS Configuration | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.51] EC2 Client VPN endpoints should have client connection logging enabled | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EKS.8] EKS clusters should have audit logging enabled | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Neptune.2] Neptune DB clusters should publish audit logs to CloudWatch Logs | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [NetworkFirewall.2] Network Firewall logging should be enabled | no data | ||||
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Transfer.3] Transfer Family connectors should have logging enabled | no data |
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|