CCI-002696
Verify correct operation of organization-defined security functions.
The IBM Aspera High-Speed Transfer Server must configure the SELinux context type to allow the "aspshell".
1 rule found Severity: Medium

The Ivanti MobileIron Core server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
1 rule found Severity: Medium

The MobileIron Core v10 server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of the hardware model of the device; - query the current version of installed mobile applications; - read audit logs kept by the MD.
1 rule found Severity: Medium

The Samsung SDS EMM must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of installed mobile applications; - read audit logs kept by the MD.
1 rule found Severity: Medium

The Workspace ONE UEM server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of installed mobile applications; - read audit logs kept by the MD.
1 rule found Severity: Medium

The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.
2 rules found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must use a file integrity tool to verify correct operation of all security functions.
1 rule found Severity: Medium

The Ivanti EPMM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must use a file integrity tool to verify correct operation of all security functions.
1 rule found Severity: Medium

Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.
1 rule found Severity: Medium

NixOS must notify designated personnel if baseline configurations are changed in an unauthorized manner.
1 rule found Severity: Medium

The application performing organization-defined security functions must verify correct operation of security functions.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must use a file integrity tool to verify correct operation of all security functions.
1 rule found Severity: Medium

1 rule found Severity: Medium

The organization-defined role must verify correct operation of security functions in the container platform.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Mainframe Product performing organization-defined security functions must verify correct operation of security functions.
1 rule found Severity: Medium

The configuration integrity of the container platform must be ensured and compliance policies must be configured.
1 rule found Severity: High

The OL 8 operating system must use a file integrity tool to verify correct operation of all security functions.
1 rule found Severity: Medium

The RHEL 8 operating system must use a file integrity tool to verify correct operation of all security functions.
1 rule found Severity: Medium

1 rule found Severity: High

Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
2 rules found Severity: Medium

The SUSE operating system must use a file integrity tool to verify correct operation of all security functions.
2 rules found Severity: Medium

The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).
2 rules found Severity: Medium

2 rules found Severity: Medium

The UEM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
1 rule found Severity: Medium
