CCI-001744
Implement organization-defined security responses automatically if baseline configurations are changed in an unauthorized manner.
The DataPower Gateway must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

Nutanix AOS must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

Tanium must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.
1 rule found Severity: Medium

The BIG-IP appliance must be configured to implement automated security responses if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

3 rules found Severity: Medium

The Oracle Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
1 rule found Severity: Medium

1 rule found Severity: Medium

Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.
1 rule found Severity: Medium

The TOSS file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
1 rule found Severity: Medium

NixOS must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
1 rule found Severity: Medium

The operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

IBM Security zSecure must implement organization-defined automated security responses if baseline zSecure configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

IBM z/OS system administrator must develop a procedure to notify designated personnel if baseline configurations are changed in an unauthorized manner.
3 rules found Severity: Medium

The Mainframe Product must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
1 rule found Severity: Medium

The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
1 rule found Severity: Medium

OL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
1 rule found Severity: Medium

RHEL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
1 rule found Severity: Medium

RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
1 rule found Severity: Medium

Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
2 rules found Severity: Medium

The SUSE operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
2 rules found Severity: Medium

The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
2 rules found Severity: Medium

The VMM must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

The vCenter server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
2 rules found Severity: Medium

vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
1 rule found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium
