CCI-001495
Protect audit tools from unauthorized deletion.
30 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The IBM Aspera Console feature audit tools must be protected from unauthorized modification or deletion.
1 rule found Severity: Medium

1 rule found Severity: Medium

The IBM z/VM AUDT and Journal Mini Disks must be restricted to the appropriate system administrators.
1 rule found Severity: Medium

SQL Server and the operating system must protect SQL Server audit features from unauthorized removal.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Tanium application must prohibit user installation of software without explicit privileged status.
1 rule found Severity: Medium

The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status.
3 rules found Severity: Medium

1 rule found Severity: Medium

3 rules found Severity: Medium

2 rules found Severity: Medium

The BIG-IP Core implementation must be configured to protect audit tools from unauthorized deletion.
1 rule found Severity: Medium

The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 audit tools must have the proper permissions configured to protect against unauthorized access.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must have directories that contain system commands set to a mode of "755" or less permissive.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

3 rules found Severity: Medium

The HYCU virtual appliance must protect audit tools from unauthorized access, modification, and deletion.
1 rule found Severity: Medium

IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.
1 rule found Severity: Medium

IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.
2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system audit tools must have the proper permissions configured to protect against unauthorized access.
2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

Rancher MCM must use a centralized user management solution to support account management functions. For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
1 rule found Severity: High
