CCI-000164
Protect audit information from unauthorized deletion.
1 rule found Severity: Medium

The BlackBerry Enterprise Mobility Server (BEMS) must protect log information from unauthorized deletion.
2 rules found Severity: Medium

1 rule found Severity: Medium

The FortiGate firewall must protect the traffic log from unauthorized deletion of local log files and log records.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

3 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.
2 rules found Severity: Medium

1 rule found Severity: Medium

The Ubuntu operating system must ensure only authorized groups can own the audit log directory and its underlying files.
1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

3 rules found Severity: Medium

The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.
1 rule found Severity: Medium

The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.
2 rules found Severity: Medium

1 rule found Severity: Medium

The BIG-IP Core implementation must be configured to protect audit information from unauthorized deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Arista network Arista device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.
1 rule found Severity: High

2 rules found Severity: Medium

The Enterprise Voice, Video, and Messaging Session Manager must protect session (call) records from unauthorized deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The log information from the IIS 10.0 web server must be protected from unauthorized modification or deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.
1 rule found Severity: Medium

The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized deletion.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
1 rule found Severity: High

The audit information produced by Redis Enterprise DBMS must be protected from unauthorized deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

TOSS audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The log information from the Apache web server must be protected from unauthorized modification or deletion.
1 rule found Severity: Medium

The log information from the Apache web server must be protected from unauthorized deletion and modification.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must be configured to permit only authorized users ownership of the audit log files.
1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must be configured so that the audit log directory is not write-accessible by unauthorized users.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The firewall must protect the traffic log from unauthorized deletion of local log files and log records.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
1 rule found Severity: Medium

IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The audit information produced by SQL Server must be protected from unauthorized access, modification, and deletion.
1 rule found Severity: Medium

Windows Server 2019 permissions for the Application event log must prevent access by non-privileged accounts.
1 rule found Severity: Medium

Windows Server 2019 permissions for the Security event log must prevent access by non-privileged accounts.
1 rule found Severity: Medium

Windows Server 2019 permissions for the System event log must prevent access by non-privileged accounts.
1 rule found Severity: Medium

Windows Server 2019 Manage auditing and security log user right must only be assigned to the Administrators group.
1 rule found Severity: Medium

Windows 10 permissions for the Application event log must prevent access by non-privileged accounts.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 permissions for the Application event log must prevent access by nonprivileged accounts.
1 rule found Severity: Medium

Windows Server 2022 permissions for the Security event log must prevent access by nonprivileged accounts.
1 rule found Severity: Medium

Windows Server 2022 permissions for the System event log must prevent access by nonprivileged accounts.
1 rule found Severity: Medium

Windows Server 2022 manage auditing and security log user right must only be assigned to the Administrators group.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The OL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 audit logs must be group-owned by root or by a restricted logging group to prevent unauthorized read access.
1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 audit logs file must have mode 0600 or less permissive to prevent unauthorized access to the audit log.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
1 rule found Severity: High
