CCI-001494
Protect audit tools from unauthorized modification.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The IBM Aspera Console feature audit tools must be protected from unauthorized modification or deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators.
1 rule found Severity: Medium

SQL Server and/or the operating system must protect its audit configuration from unauthorized modification.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Symantec ProxySG must protect the Web Management Console, SSH, and command line interface (CLI) from unauthorized modification.
1 rule found Severity: Medium

The Tanium application must prohibit user installation of software without explicit privileged status.
1 rule found Severity: Medium

The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status.
3 rules found Severity: Medium

2 rules found Severity: Medium

3 rules found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
1 rule found Severity: High

The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.
2 rules found Severity: Medium

The BIG-IP Core implementation must be configured to protect audit tools from unauthorized modification.
1 rule found Severity: Medium

The BIG-IP Core implementation must be configured to activate a session lock to conceal information previously visible on the display for connections to virtual servers.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

3 rules found Severity: Medium

The HYCU virtual appliance must protect audit tools from unauthorized access, modification, and deletion.
1 rule found Severity: Medium

IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
1 rule found Severity: Medium

IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must protect its audit configuration from authorized and unauthorized access and modification.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system audit tools must have the proper permissions configured to protect against unauthorized access.
2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

The Oracle Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
1 rule found Severity: High

Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
1 rule found Severity: High
