Skip to main content
Skip table of contents

NIST – Reports and Reporting Packages

 

The Intelligent Indexing settings are recommendations. The default configuration is No.

Summary Reports 


Report Name

Report Description

Augmented RequirementsData SourceIntelligent IndexingClassificationLog Sources

Report ID

CCF: Applications Accessed By User Summary

This report provides information about user accessed applications.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.9, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-6, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-3, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-5, SA-9, SC-16, SC-2, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SI-2, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)NoOperationsAll Available Log Sources

2063

CCF: Audit Log Summary

This report provides a summary of audit log clearing or write failures by Impacted Host.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.21, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.10.1, 3.10.2, 3.10.3, 3.10.4, 3.10.5, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.10, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.7.6, 3.8.1, 3.8.2, 3.8.5, 3.8.7, 3.8.8, 3.8.9, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AC-7, AU-10, AU-11, AU-12, AU-13, AU-14, AU-15, AU-3, AU-4, AU-5, AU-6, AU-7, AU-8, AU-9, CA-2, CA-7, CM-11, CM-12, CM-3, CM-5, CM-6, CM-7, CM-8, CP-13, CP-6, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-2, DE.CM-3, DE.CM-4, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-3, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-6, MP-7, MP-8, PA-3, PA-4, PE-17, PE-2, PE-3, PE-4, PE-5, PE-6, PE-7, PE-8, PL-4, PL-8, PL-9, PM-12, PM-14, PM-17, PM-23, PM-26, PM-6, PR.AC-1, PR.AC-2, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-3, PR.DS-4, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-3, SA-4, SA-5, SA-9, SC-13, SC-16, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-5, SC-7, SC-8, SI-11, SI-12, SI-14, SI-16, SI-17, SI-18, SI-19, SI-2, SI-20, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerYesAuditAll Available Log Sources

2076

CCF: Backup Activity Summary

This report provides a summary of activity from backup events.

Augment: 3.1.10, 3.1.12, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.6.1, 3.6.2, 3.6.3, 3.8.9, AC-16, AC-20, AC-21, AC-23, AU-10, AU-11, AU-12, AU-14, AU-15, AU-3, AU-4, AU-5, AU-6, AU-7, AU-9, CA-2, CA-7, CP-13, CP-6, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, DE.DP-2, DE.DP-5, ID.AM-5, ID.RA-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.DS-1, PR.DS-2, PR.DS-4, PR.IP-4, PR.IP-9, PR.PT-1, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SC-2, SC-28, SC-36, SC-38, SC-4, SC-7, SI-11, SI-17, SI-3, SI-4, SI-5, SI-7, SI-8Data Processor(s)NoOperationsAll Available Log Sources

2062

CCF: Compromises Detected Summary

This report provides a summary of detected compromises of security by Entity and Impacted Host.

Augment: 3.1.12, 3.1.3, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.6.1, 3.6.2, 3.6.3, AC-16, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.DS-5, PR.IP-9, PR.PT-1, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-9, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SI-14, SI-2, SI-3, SI-4, SI-5, SI-7, SI-8LogMartYesSecurityAll Available Log Sources

2064

CCF: Config/Policy Change Summary

This report provides a summary of the occurrence of configuration or policy changes across critical and production environments (entity structure).

Augment: 3.1.10, 3.1.12, 3.1.13, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.4.2, 3.4.3, 3.4.6, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, AC-16, AC-20, AC-23, AC-4, AU-10, AU-11, AU-12, AU-14, AU-15, AU-3, AU-5, AU-6, AU-7, AU-9, CA-2, CA-7, CM-11, CM-12, CM-3, CM-5, CM-6, CM-7, CM-8, CP-13, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, IA-7, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-3, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-3, SA-4, SA-5, SA-9, SC-13, SC-16, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-7, SI-16, SI-2, SI-3, SI-4, SI-5, SI-7LogMartYesAuditAll Available Log Sources

2049

CCF: Critical Environment Error Summary

This report provides summary details around critical or error messages received from critical servers or systems (entity structure) to support change management procedures.

Augment: 3.1.12, 3.1.3, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.4.2, 3.4.3, 3.4.6, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.9, AC-16, AC-20, AC-23, AU-10, AU-11, AU-12, AU-14, AU-15, AU-3, AU-4, AU-5, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-6, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.DS-4, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-3, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-3, SA-5, SA-9, SC-16, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-7, SI-11, SI-17, SI-2, SI-3, SI-4, SI-5, SI-7Platform ManagerYesOperationsAll Available Log Sources

2050

CCF: GeoIP Summary

This report summarizes GeoIP activity that is associated with AI Engine GeoIP rules, in the CCF compliance automation suite.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerYesSecurityAll Available Log Sources

2069

CCF: LogRhythm Data Loss Defender Log Summary

This report provides summary information on data generated by the LogRhythm Data Loss Defender. Data is grouped by Entity, Impacted Host, Common Event, and Object with a count of how many times that condition has been experienced within the reporting period.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.21, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.4.2, 3.4.3, 3.4.6, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, 3.8.9, 3.9.2, AC-16, AC-17, AC-18, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AU-10, AU-11, AU-12, AU-13, AU-14, AU-15, AU-3, AU-5, AU-6, AU-7, AU-9, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-6, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-3, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-6, MP-7, MP-8, PA-3, PA-4, PE-17, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-7, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-13, SC-16, SC-18, SC-2, SC-24, SC-27, SC-28, SC-31, SC-36, SC-38, SC-4, SC-7, SI-12, SI-16, SI-18, SI-19, SI-2, SI-20, SI-3, SI-4, SI-5, SI-7LogMartYesOperationsAll Available Log Sources

2066

CCF: Malware Detected Summary

This report provides a summary of malware activity by entity and impacted host within the organization's critical and production environments (entity structure).

Augment: 3.1.12, 3.1.3, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.6.1, 3.6.2, 3.6.3, AC-16, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-4, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.DS-5, PR.IP-9, PR.PT-1, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-9, SC-18, SC-24, SC-27, SC-31, SC-36, SC-38, SC-40, SC-7, SI-14, SI-3, SI-4, SI-5, SI-7, SI-8Platform ManagerYesSecurityAll Available Log Sources

2051

CCF: Object Access Summary

This report summarizes object access by Impacted Host.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.21, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, AU-9, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-3, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-2, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SI-12, SI-16, SI-18, SI-19, SI-20, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)NoAuditAll Available Log Sources

2067

CCF: Patch Activity Summary

This report provides a summary of applied patches grouped by Origin Host. It can demonstrate that all system components have the latest security patches installed.

Augment: 3.1.10, 3.1.12, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.4.2, 3.4.3, 3.4.6, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, AC-16, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-5, AU-6, AU-7, CA-2, CA-7, CM-11, CM-12, CM-3, CM-5, CM-6, CM-7, CM-8, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-3, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-3, SA-4, SA-5, SA-9, SC-16, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-7, SI-11, SI-17, SI-2, SI-3, SI-4, SI-5, SI-7Data Processor(s)YesOperationsAll Available Log Sources

2052

CCF: Physical Access Summary

This report summarizes physical door access/authentication success and failures within the organization's physical security perimeter.

Augment: 3.1.1, 3.1.10, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.10.1, 3.10.2, 3.10.3, 3.10.4, 3.10.5, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.7, 3.3.6, 3.3.8, 3.3.9, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.6, 3.8.1, 3.8.2, 3.8.5, 3.8.7, 3.8.8, 3.8.9, 3.9.2, AC-10, AC-2, AC-24, AC-25, AC-3, AC-6, AU-11, AU-12, AU-14, AU-6, AU-7, AU-9, CA-2, CA-7, CP-6, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-2, DE.CM-6, DE.CM-7, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PE-17, PE-2, PE-3, PE-4, PE-5, PE-6, PE-7, PE-8, PL-8, PM-6, PR.AC-1, PR.AC-2, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.IP-4, PR.IP-9, PR.PT-1, PR.PT-2, PS-4, PS-5, PS-7, PS-8, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-9, SC-2, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SI-6, SI-7Platform ManagerYesAuditAll Available Log Sources

2053

CCF: Priv Account Management Activity Summary

This report provides a summary of various access modifications to privileged accounts occurring within the defined environments. This report requires the CCF: Privileged Accounts (user list) be established and periodically updated.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)YesAuditAll Available Log Sources

2080

CCF: Priv Authentication Activity Summary

This report provides summary information around privileged account authentication success and access success activity within the defined environment. This report relies on CCF: Privileged Accounts (user list) to be established and updated periodically.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7Platform ManagerYesAuditAll Available Log Sources

2079

CCF: Rogue Access Point Summary

This report provides a summary of all detected rogue wireless access points by Impacted Host across critical and production environments (entity structure).
 

Augment: 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.6.1, 3.6.2, 3.6.3, 3.8.1, 3.8.2, AC-16, AC-17, AC-18, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PE-17, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.IP-9, PR.PT-1, PR.PT-2, PR.PT-4, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-9, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-14, SI-3, SI-4, SI-5, SI-7, SI-8Platform ManagerYesSecurityAll Available Log Sources

2054

CCF: Signature Activity Summary

This report provides summary information on signature update activity across critical and production environments (entity structure).

Augment: 3.1.10, 3.1.12, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.4.2, 3.4.3, 3.4.6, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, AC-16, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-5, AU-6, AU-7, CA-2, CA-7, CM-11, CM-12, CM-3, CM-5, CM-6, CM-7, CM-8, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-3, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-3, SA-4, SA-5, SA-9, SC-16, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-7, SI-11, SI-17, SI-2, SI-3, SI-4, SI-5, SI-7LogMartYesOperationsAll Available Log Sources

2055

CCF: Social Media Summary

Summarizes the top URLs related to Social Media activity.

Augment: 3.1.10, 3.1.12, 3.1.19, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.6.1, 3.6.2, 3.6.3, 3.8.1, 3.8.2, AC-16, AC-20, AC-21, AC-23, AC-4, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, MA-5, MA-6, MP-2, MP-4, MP-8, PA-4, PE-17, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.IP-9, PR.PT-1, PR.PT-2, PS-7, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-4, SA-9, SC-28, SC-36, SC-38, SC-7, SI-12, SI-16, SI-3, SI-4, SI-5, SI-7Platform ManagerNoAuditAll Available Log Sources

2070

CCF: Suspected Wireless Attack Summary

This report provides summary information on suspected wireless attacks at the internal boundary including the type if attack and impacted (targeted) host and application (if applicable). To supplement this Summary Report consider running an Investigation to capture further information. This is based on Critical and Production environments (can be defined with entity structure).
 

Augment: 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.6.1, 3.6.2, 3.6.3, 3.8.1, 3.8.2, AC-16, AC-18, AC-20, AC-23, AC-4, AU-12, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-4, PE-17, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-5, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.IP-9, PR.PT-1, PR.PT-2, PR.PT-4, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-9, SC-18, SC-2, SC-24, SC-27, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-14, SI-3, SI-4, SI-5, SI-7, SI-8Platform ManagerYesSecurityAll Available Log Sources

2056

CCF: Time Sync Error Summary

This report provides a summary of time sync errors occurring within critical and production environments (can be defined with entity structure).
 

Augment: 3.1.12, 3.1.3, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.6.1, 3.6.2, 3.6.3, 3.8.9, AC-16, AC-20, AC-23, AU-11, AU-12, AU-14, AU-15, AU-3, AU-4, AU-5, AU-6, AU-7, AU-8, CA-2, CA-7, CP-13, CP-6, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-6, IR-7, IR-9, PL-8, PL-9, PM-12, PM-14, PM-17, PM-26, PM-6, PR.DS-4, PR.IP-9, PR.PT-1, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-9, SC-18, SC-24, SC-27, SC-31, SC-36, SC-38, SC-7, SI-11, SI-17, SI-3, SI-4, SI-5, SI-7Platform ManagerYesOperationsAll Available Log Sources

2057

CCF: Top Suspicious Users

This report lists all users generating suspicious activity ordered by the number of events detected highest to lowest.
 

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.IP-9, PR.PT-1, PR.PT-2, PR.PT-4, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-14, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Data Processor(s)YesSecurityAll Available Log Sources

2059

CCF: Use Of Non-Encrypted Protocols Summary

This report lists any use of non-encrypted protocols.
 

Augment: 3.1.10, 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.4.2, 3.4.3, 3.4.6, 3.5.10, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, AC-16, AC-17, AC-18, AC-20, AC-21, AC-23, AC-24, AC-25, AC-4, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, AU-9, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.AC-3, PR.AC-5, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-6, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-18, SA-19, SA-4, SA-5, SA-9, SC-13, SC-16, SC-18, SC-2, SC-28, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-12, SI-16, SI-18, SI-19, SI-20, SI-3, SI-4, SI-5, SI-7LogMartYesAuditAll Available Log Sources

2060

CCF: User Misuse Summary

This report summarizes detected misuse by user.

Augment: 3.1.10, 3.1.12, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.14.1, 3.14.2, 3.14.3, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.6.1, 3.6.2, 3.6.3, 3.8.1, 3.8.2, AC-10, AC-16, AC-17, AC-20, AC-21, AC-23, AC-24, AC-25, AC-6, AU-10, AU-12, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.IP-9, PR.PT-1, PR.PT-2, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-9, SC-18, SC-2, SC-28, SC-36, SC-38, SC-4, SC-7, SI-14, SI-3, SI-4, SI-5, SI-7, SI-8Platform ManagerNoSecurityAll Available Log Sources

2061

CCF: User Priv Escalation (SU & SUDO) Summary

This report provides summary information specific to a user privilege level status on a Linux environment. This report is specific to Linux based on a search for the MPE rule of SU Session Opened (flat file, SUDO log, or syslog).

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.21, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, AU-9, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-3, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-2, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SI-12, SI-16, SI-18, SI-19, SI-20, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)YesAuditAll Available Log Sources

2078

CCF: User Priv Escalation (Windows) Summary

This report provides summary information around changes in privilege level status of a user on a critical server or workstation, specific to Windows based on event ID, security metadata field of 2. This type of log is generated when a new process is created on a Windows machine and the token type is recorded in the object metadata field. Audit privilege use and audit process tracking must be enabled on the Windows machine being audited.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)YesAuditAll Available Log Sources

2077

CCF: Vulnerability Detected Summary

This report provides a summary of potential vulnerabilities detected across the critical and production environments (can be defined with entity structure).
 

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7Platform ManagerYesSecurityAll Available Log Sources

2058

CCF: Account Disabled Summary

This report provides detailed information when an account has access revoked (disabled) across any logged environments. This should align with the organization's policies regarding disabled accounts.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8LogMartNoAuditAll Available Log Sources

2084

CCF: Account Enabled Summary

This report provides detailed information when an account as access granted (enabled) across to any logged environments. This should align with the organization's policies regarding enabled accounts.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerYesAuditAll Available Log Sources

2085

CCF: Account Deleted Summary

This report provides detailed information when an account has access revoked (deleted) across to any logged environments. This should align with the organization's policies regarding deleted accounts.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2086

CCF: Account Modification Summary

This report provides summary information around account modifications across all logged environments.

 

 

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2092

CCF: Term Account Activity Summary

This report provides a summary of authentication successes and failures from terminated accounts (list) within any logged environments. This should align with the organization's termination policy.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Data Processor(s)YesAuditAll Available Log Sources

2087

CCF: Auth Failure Summary

This report provides summary information around account authentication failures across all logged environments.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AC-7, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2088

CCF: Access Failure Summary

This report provides summary information around account access failures across all logged environments.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AC-7, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2089

CCF: Auth Success Summary

This report provides summary information around account authentication successes across all logged environments.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2090

CCF: User Object Access Summary

This report summarizes successful object access activity by user.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.21, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.8, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.8.7, 3.8.8, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, AU-9, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, CP-9, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-3, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-2, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-23, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-4, PR.IP-6, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-2, SC-28, SC-3, SC-36, SC-38, SC-4, SC-7, SI-12, SI-16, SI-18, SI-19, SI-20, SI-3, SI-4, SI-5, SI-6, SI-7Data Processor(s)NoAuditAll Available Log Sources

2068

CCF: Access Success Summary

This report provides summary information around account access successes across all logged environments.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.16, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-3, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Platform ManagerNoAuditAll Available Log Sources

2091

Detailed Reports

Report Name

Report Description

Augmented RequirementsData SourceIntelligent IndexingClassificationLog Sources

Report ID

CCF: Host Access Granted And Revoked Detail

This report details all access granted and revoked for production systems.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AC-6, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-7, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-17, PM-26, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-14, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Data Processor(s)YesAuditAll Available Log Sources

2065

CCF: Unknown User Account Detail

This report provides detail of activity from unknown user accounts, based off CCF user lists.

Augment: 3.1.1, 3.1.10, 3.1.12, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.18, 3.1.19, 3.1.2, 3.1.20, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.13.1, 3.13.15, 3.13.2, 3.13.4, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.6, 3.14.7, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.9, 3.4.2, 3.4.3, 3.4.6, 3.5.1, 3.5.2, 3.5.3, 3.6.1, 3.6.2, 3.6.3, 3.7.1, 3.7.2, 3.8.1, 3.8.2, 3.9.2, AC-10, AC-16, AC-17, AC-18, AC-2, AC-20, AC-21, AC-23, AC-24, AC-25, AC-3, AC-4, AU-10, AU-12, AU-13, AU-14, AU-15, AU-3, AU-6, AU-7, CA-2, CA-7, CM-12, CM-3, CM-5, CM-6, CM-7, CP-13, CP-7, DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-6, DE.CM-7, DE.DP-2, DE.DP-5, IA-10, IA-12, IA-2, IA-3, IA-4, IA-5, IA-8, IA-9, ID.AM-4, ID.AM-5, ID.RA-3, ID.SC-3, ID.SC-4, IP-2, IP-4, IR-10, IR-4, IR-5, IR-6, IR-7, IR-9, MA-4, MA-5, MA-6, MP-2, MP-4, MP-7, MP-8, PA-3, PA-4, PE-17, PL-4, PL-8, PL-9, PM-12, PM-6, PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7, PR.DS-1, PR.DS-2, PR.DS-5, PR.DS-8, PR.IP-1, PR.IP-3, PR.IP-9, PR.MA-1, PR.MA-2, PR.PT-1, PR.PT-2, PR.PT-3, PR.PT-4, PS-4, PS-5, PS-7, PS-8, RA-2, RA-3, RA-7, RC.RP-1, RS.AN-1, RS.AN-3, RS.AN-4, RS.CO-2, RS.MI-2, RS.MI-3, RS.RP-1, SA-10, SA-18, SA-19, SA-4, SA-5, SA-9, SC-18, SC-2, SC-24, SC-27, SC-28, SC-3, SC-31, SC-36, SC-38, SC-4, SC-40, SC-7, SC-8, SI-14, SI-3, SI-4, SI-5, SI-6, SI-7, SI-8Data Processor(s)YesSecurityAll Available Log Sources

2071

Reporting Packages

Report Package Name

Report Package Description

Report Package ID

CCF: Daily IT Operations Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Operations on a daily basis.

89

CCF: Daily IT Security Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Security on a daily basis.

90

CCF: Executive Reporting Package

This reporting package is a template to deliver pertinent content for Executives on a monthly basis.

87

CCF: Weekly Audit Reporting Package

This Reporting Package is a template to deliver pertinent content for Internal and/or External Audit groups on a weekly basis

88

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.