CCI-000126
Specify the organization-defined event types (subset of the event types defined in AU-2a) along with the frequency of (or situation requiring logging for each identified event type.
7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

7 rules found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all unsuccessful account access events.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.
1 rule found Severity: Medium
