8.8: Enable Command-Line Audit Logging

Enable command-line audit logging for command shells, such as Microsoft PowerShell and Bash.

Asset Type

Security Function

Implementation Groups

Devices

Detect

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. The list of endpoints

  2. Approved configuration(s) for command line auditing of command shells (note: there may be multiple configurations based on the various types of endpoints, including various operating systems, etc.)

Operations

  1. For each endpoint in Input 1, examine the endpoint to see if it is configured according to the appropriate approved configuration(s) from Input 2.

  2. Create a list of endpoints that meet the approved configuration (M1)

  3. Create a list of endpoints that do not meet the approved configuration (M3), noting the deviations.

Measures

  • M1 = List of endpoints that meet the approved command shell logging configurations (compliant list)

  • M2 = Count of endpoints (count of Input 1)

  • M3 (Optional) = List of endpoints that do not meet the approved command shell logging configurations (non-compliant list)

  • M4 (Optional) = Count of non-compliant endpoints (count of M3)

Metrics

Coverage

Metric

The ratio of endpoints compliant with command shell logging configurations to the
total number of endpoints

Calculation

M1 / M2