Capacity
CCI-001496
Implement cryptographic mechanisms to protect the integrity of audit tools.
Choose one
20
Rule
Severity: High
Verify and Correct File Permissions with RPM
15
Rule
Severity: High
Verify and Correct Ownership with RPM
11
Rule
Severity: Medium
Configure AIDE to Verify the Audit Tools
2
Rule
Severity: Medium
The application server must use cryptographic mechanisms to protect the integrity of log tools.
2
Rule
Severity: Medium
Application audit tools must be cryptographically hashed.
2
Rule
Severity: Medium
The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value.
2
Rule
Severity: Medium
The Mainframe Product must use cryptographic mechanisms to protect the integrity of audit tools.
1
Rule
Severity: High
Nutanix AOS must use cryptographic mechanisms to protect the integrity of audit tools.
2
Rule
Severity: Medium
Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
3
Rule
Severity: High
The macOS system must ensure System Integrity Protection is enabled.
3
Rule
Severity: Medium
The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.
2
Rule
Severity: Medium
The container platform must use cryptographic mechanisms to protect the integrity of audit tools.
2
Rule
Severity: High
The operating system must use cryptographic mechanisms to protect the integrity of audit tools.
2
Rule
Severity: Medium
AIX must verify the hash of audit tools.
2
Rule
Severity: Medium
OL 8 must use cryptographic mechanisms to protect the integrity of audit tools.
2
Rule
Severity: Medium
Automation Controller must use cryptographic mechanisms to protect the integrity of log tools.
2
Rule
Severity: Medium
All audit records must generate the event results within OpenShift.
1
Rule
Severity: High
The Red Hat Enterprise Linux operating system must be configured so that the file permissions, ownership, and group membership of system files and commands match the vendor values.
2
Rule
Severity: Medium
RHEL 8 must use cryptographic mechanisms to protect the integrity of audit tools.
4
Rule
Severity: Medium
The SUSE operating system file integrity tool must be configured to protect the integrity of the audit tools.
2
Rule
Severity: Medium
RHEL 9 must use cryptographic mechanisms to protect the integrity of audit tools.
4
Rule
Severity: Medium
System packages must be configured with the vendor-provided files, permissions, and ownerships.
2
Rule
Severity: Medium
The VMM must use cryptographic mechanisms to protect the integrity of audit tools.
1
Rule
Severity: Medium
The ESXi host must implement Secure Boot enforcement.
3
Rule
Severity: Medium
The ESXi host must enable Secure Boot.
1
Rule
Severity: Medium
The Photon operating system package files must not be modified.
3
Rule
Severity: High
The Photon operating system must use cryptographic mechanisms to protect the integrity of audit tools.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must use cryptographic mechanisms to protect the integrity of audit tools.
1
Rule
Severity: Medium
SLEM 5 file integrity tool must be configured to protect the integrity of the audit tools.
1
Rule
Severity: Medium
TOSS must use cryptographic mechanisms to protect the integrity of audit tools.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%