Capacity
CCI-001744
Implement organization-defined security responses automatically if baseline configurations are changed in an unauthorized manner.
Choose one
26
Rule
Severity: Medium
Install AIDE
20
Rule
Severity: Medium
Configure Periodic Execution of AIDE
13
Rule
Severity: Medium
Configure Notification of Post-AIDE Scan Details
9
Rule
Severity: Medium
The mailx Package Is Installed
1
Rule
Severity: Medium
The DataPower Gateway must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
2
Rule
Severity: Medium
The Mainframe Product must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
Nutanix AOS must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
Tanium must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
1
Rule
Severity: Medium
The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
2
Rule
Severity: Medium
The operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner.
6
Rule
Severity: Medium
IBM z/OS system administrator must develop a procedure to notify designated personnel if baseline configurations are changed in an unauthorized manner.
2
Rule
Severity: Medium
System files must be monitored for unauthorized changes.
2
Rule
Severity: Medium
Windows Server 2019 system files must be monitored for unauthorized changes.
2
Rule
Severity: Medium
Windows Server 2022 system files must be monitored for unauthorized changes.
2
Rule
Severity: Medium
The Oracle Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.
2
Rule
Severity: Medium
The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.
2
Rule
Severity: Medium
The Oracle Linux operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
2
Rule
Severity: Medium
The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
2
Rule
Severity: Medium
OL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
2
Rule
Severity: Medium
The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.
2
Rule
Severity: Medium
RHEL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
2
Rule
Severity: Medium
RHEL 9 must have the s-nail package installed.
4
Rule
Severity: Medium
Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
4
Rule
Severity: Medium
The SUSE operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
2
Rule
Severity: Medium
RHEL 9 must have the AIDE package installed.
2
Rule
Severity: Medium
RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
4
Rule
Severity: Medium
The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
2
Rule
Severity: Medium
The VMM must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
The Photon operating system must have the auditd service running.
3
Rule
Severity: Medium
The vCenter server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
1
Rule
Severity: Medium
vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
3
Rule
Severity: Medium
The Photon operating system must enable the auditd service.
1
Rule
Severity: Medium
The BIG-IP appliance must be configured to implement automated security responses if baseline configurations are changed in an unauthorized manner.
2
Rule
Severity: Medium
The s-nail Package Is Installed
2
Rule
Severity: Medium
Configure Systemd Timer Execution of AIDE
2
Rule
Severity: Medium
Configure AIDE To Notify Personnel if Baseline Configurations Are Altered
1
Rule
Severity: Medium
Ubuntu 22.04 LTS must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
1
Rule
Severity: Medium
IBM Security zSecure must implement organization-defined automated security responses if baseline zSecure configurations are changed in an unauthorized manner.
1
Rule
Severity: Medium
SLEM 5 must use a file integrity tool to verify correct operation of all security functions.
1
Rule
Severity: Medium
Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.
1
Rule
Severity: Medium
The TOSS file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
1
Rule
Severity: Medium
The Photon operating system must configure AIDE to detect changes to baseline configurations.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%