Ensure the audit Subsystem is Installed
Ensure auditd Collects Information on Exporting to Media (successful)
Ensure auditd Collects System Administrator Actions
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Record Events that Modify the System's Discretionary Access Controls - umount
Record Events that Modify the System's Discretionary Access Controls - umount2
Ensure auditd Collects File Deletion Events by User
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Ensure the audit-libs package as a part of audit Subsystem is Installed
Enable Auditing for Processes Which Start Prior to the Audit Daemon
Extend Audit Backlog Limit for the Audit Daemon
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Any Attempts to Run chcon
Record Any Attempts to Run restorecon
Record Any Attempts to Run semanage
Record Any Attempts to Run setfiles
Record Any Attempts to Run setsebool
Record Unsuccessful Creation Attempts to Files - open_by_handle_at O_CREAT
Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE
Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - open O_CREAT
Record Unsuccessful Modification Attempts to Files - open O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To open Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - openat O_CREAT
Record Unsuccessful Modification Attempts to Files - openat O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To openat Are Ordered Correctly
Record Unsuccessful Delete Attempts to Files - rename
Record Unsuccessful Delete Attempts to Files - renameat
Record Unsuccessful Delete Attempts to Files - unlink
Record Unsuccessful Delete Attempts to Files - unlinkat
Record Attempts to Alter Logon and Logout Events
Record Attempts to Alter Logon and Logout Events - faillock
Record Attempts to Alter Logon and Logout Events - lastlog
Record Attempts to Alter Logon and Logout Events - tallylog
Ensure auditd Collects Information on the Use of Privileged Commands - chage
Ensure auditd Collects Information on the Use of Privileged Commands - chsh
Ensure auditd Collects Information on the Use of Privileged Commands - crontab
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - insmod
Ensure auditd Collects Information on the Use of Privileged Commands - kmod
Ensure auditd Collects Information on the Use of Privileged Commands - modprobe
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - pam_timestamp_check
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - postdrop
Ensure auditd Collects Information on the Use of Privileged Commands - postqueue
Ensure auditd Collects Information on the Use of Privileged Commands - pt_chown
Ensure auditd Collects Information on the Use of Privileged Commands - rmmod
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - umount
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects System Administrator Actions - /etc/sudoers
Ensure auditd Collects System Administrator Actions - /etc/sudoers.d/
Record Attempts to perform maintenance activities
Record Any Attempts to Run chacl
Record Any Attempts to Run setfacl
Record Any Attempts to Run ssh-agent
Ensure auditd Collects Information on the Use of Privileged Commands - unix_update
Ensure auditd Collects Information on the Use of Privileged Commands - usermod
Ensure the libaudit1 package as a part of audit Subsystem is Installed
Record Any Attempts to Run chmod
Record Any Attempts to Run rm
Record Attempts to Alter Logon and Logout Events - faillog
Ensure auditd Collects Information on the Use of Privileged Commands - chfn
Ensure auditd Collects Information on the Use of Privileged Commands - passmass
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd
Applications used for non-local maintenance sessions must audit non-local maintenance and diagnostic sessions for organization-defined auditable events.
Mainframe Products must audit nonlocal maintenance and diagnostic sessions audit events as defined in site security plan.
Nutanix AOS must audit all activities performed during nonlocal maintenance and diagnostic sessions.
Prisma Cloud Compute must be configured for forensic data collection.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
The macOS system must be configured to audit all administrative action events.
The macOS system must be configured to audit all log on and log out events.
The macOS system must enable security auditing.
The macOS system must be configured to audit all deletions of object attributes.
The macOS system must be configured to audit all changes of object attributes.
The macOS system must configure system to audit all authorization and authentication events.
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
The Ubuntu operating system must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
The container platform must audit non-local maintenance and diagnostic sessions' organization-defined audit events associated with non-local maintenance.
The operating system must audit all activities performed during nonlocal maintenance and diagnostic sessions.
SSMC must provide audit record generation capability for DOD-defined auditable events for all operating system components.
AIX must provide audit record generation functionality for DoD-defined auditable events.
IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
IBM z/OS Required SMF data record types must be collected.
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
IBM RACF SETROPTS LOGOPTIONS must be properly configured.
IBM z/OS SMF recording options for the FTP server must be configured to write SMF records for all eligible events.
IBM z/OS required SMF data record types must be collected.
IBM z/OS SMF recording options for the TN3270 Telnet server must be properly specified.
OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The Oracle Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The Oracle Linux operating system must audit all uses of the semanage command.
The Oracle Linux operating system must audit all uses of the setsebool command.
The Oracle Linux operating system must audit all uses of the chcon command.
The Oracle Linux operating system must audit all uses of the setfiles command.
The Oracle Linux operating system must generate audit records for all unsuccessful account access events.
The Oracle Linux operating system must generate audit records for all successful account access events.
The Oracle Linux operating system must audit all uses of the mount command and syscall.
The Oracle Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
OL 8 must generate audit records for all account creation events that affect "/etc/shadow".
OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
OL 8 must generate audit records for all account creation events that affect "/etc/passwd".
OL 8 must generate audit records for all account creation events that affect "/etc/gshadow".
OL 8 must generate audit records for all account creation events that affect "/etc/group".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
OL 8 must generate audit records for any use of the "su" command.
The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
OL 8 must generate audit records for any use of the "chage" command.
OL 8 must generate audit records for any uses of the "chcon" command.
OL 8 must generate audit records for any use of the "ssh-agent" command.
OL 8 must generate audit records for any use of the "passwd" command.
OL 8 must generate audit records for any use of the "mount" command.
OL 8 must generate audit records for any use of the "umount" command.
OL 8 must generate audit records for any use of the "mount" syscall.
OL 8 must generate audit records for any use of the "unix_update" command.
OL 8 must generate audit records for any use of the "postdrop" command.
OL 8 must generate audit records for any use of the "postqueue" command.
OL 8 must generate audit records for any use of the "setsebool" command.
OL 8 must generate audit records for any use of the "unix_chkpwd" command.
OL 8 must generate audit records for any use of the "ssh-keysign" command.
OL 8 must generate audit records for any use of the "setfacl" command.
OL 8 must generate audit records for any use of the "pam_timestamp_check" command.
OL 8 must generate audit records for any use of the "newgrp" command.
OL 8 must generate audit records for any use of the "init_module" and "finit_module" system calls.
OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
OL 8 must generate audit records for any use of the "gpasswd" command.
OL 8 must generate audit records for any use of the delete_module syscall.
OL 8 must generate audit records for any use of the "crontab" command.
OL 8 must generate audit records for any use of the "chsh" command.
OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
OL 8 must generate audit records for any use of the "chmod", "fchmod", and "fchmodat" system calls.
OL 8 must generate audit records for any use of the "sudo" command.
OL 8 must generate audit records for any use of the "usermod" command.
OL 8 must generate audit records for any use of the "chacl" command.
OL 8 must generate audit records for any use of the "kmod" command.
OL 8 must generate audit records for any attempted modifications to the "faillock" log file.
OL 8 must generate audit records for any attempted modifications to the "lastlog" file.
OL 8 must enable auditing of processes that start prior to the audit daemon.
OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
All audit records must identify what type of event has occurred within OpenShift.
The Red Hat Enterprise Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The Red Hat Enterprise Linux operating system must audit all uses of the semanage command.
The Red Hat Enterprise Linux operating system must audit all uses of the setsebool command.
The Red Hat Enterprise Linux operating system must audit all uses of the chcon command.
The Red Hat Enterprise Linux operating system must audit all uses of the setfiles command.
The Red Hat Enterprise Linux operating system must generate audit records for all unsuccessful account access events.
The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.
The Red Hat Enterprise Linux operating system must audit all uses of the passwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the unix_chkpwd command.
The Red Hat Enterprise Linux operating system must audit all uses of the gpasswd command.
The Red Hat Enterprise Linux operating system must audit all uses of the chage command.
The Red Hat Enterprise Linux operating system must audit all uses of the userhelper command.
The Red Hat Enterprise Linux operating system must audit all uses of the su command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudo command.
The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.
The Red Hat Enterprise Linux operating system must audit all uses of the chsh command.
The Red Hat Enterprise Linux operating system must audit all uses of the mount command and syscall.
The Red Hat Enterprise Linux operating system must audit all uses of the umount command.
The Red Hat Enterprise Linux operating system must audit all uses of the postdrop command.
The Red Hat Enterprise Linux operating system must audit all uses of the postqueue command.
The Red Hat Enterprise Linux operating system must audit all uses of the ssh-keysign command.
The Red Hat Enterprise Linux operating system must audit all uses of the crontab command.
The Red Hat Enterprise Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
RHEL 9 must enable auditing of processes that start prior to the audit daemon.
SUSE operating system audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
The SUSE operating system must generate audit records for all uses of the su command.
The SUSE operating system must generate audit records for all uses of the sudo command.
The SUSE operating system must generate audit records for all uses of the chfn command.
The SUSE operating system must generate audit records for all uses of the mount command.
The SUSE operating system must generate audit records for all uses of the umount command.
The SUSE operating system must generate audit records for all uses of the ssh-agent command.
The SUSE operating system must generate audit records for all uses of the ssh-keysign command.
The SUSE operating system must generate audit records for all uses of the kmod command.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the gpasswd command.
The SUSE operating system must generate audit records for all uses of the newgrp command.
The SUSE operating system must generate audit records for a uses of the chsh command.
The SUSE operating system must generate audit records for all uses of the chmod command.
The SUSE operating system must generate audit records for all uses of the setfacl command.
The SUSE operating system must generate audit records for all uses of the chacl command.
Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
The SUSE operating system must generate audit records for all uses of the rm command.
The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
The SUSE operating system must generate audit records for all modifications to the lastlog file.
The SUSE operating system must generate audit records for all uses of the passmass command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd command.
The SUSE operating system must generate audit records for all uses of the chage command.
The SUSE operating system must generate audit records for all uses of the usermod command.
The SUSE operating system must generate audit records for all uses of the crontab command.
The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
The SUSE operating system must generate audit records for all uses of the delete_module command.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
The SUSE operating system must generate audit records for all modifications to the faillog file.
The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
RHEL 9 audit package must be installed.
RHEL 9 audit service must be enabled.
RHEL 9 must audit all uses of the chmod, fchmod, and fchmodat system calls.
RHEL 9 must audit all uses of the chown, fchown, fchownat, and lchown system calls.
RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
RHEL 9 must audit all uses of umount system calls.
RHEL 9 must audit all uses of the chacl command.
RHEL 9 must audit all uses of the setfacl command.
RHEL 9 must audit all uses of the chcon command.
RHEL 9 must audit all uses of the semanage command.
RHEL 9 must audit all uses of the setfiles command.
RHEL 9 must audit all uses of the setsebool command.
RHEL 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
RHEL 9 must audit all uses of the delete_module system call.
RHEL 9 must audit all uses of the init_module and finit_module system calls.
RHEL 9 must audit all uses of the chage command.
RHEL 9 must audit all uses of the chsh command.
RHEL 9 must audit all uses of the crontab command.
RHEL 9 must audit all uses of the gpasswd command.
RHEL 9 must audit all uses of the kmod command.
RHEL 9 must audit all uses of the newgrp command.
RHEL 9 must audit all uses of the pam_timestamp_check command.
RHEL 9 must audit all uses of the passwd command.
RHEL 9 must audit all uses of the postdrop command.
RHEL 9 must audit all uses of the postqueue command.
RHEL 9 must audit all uses of the ssh-agent command.
RHEL 9 must audit all uses of the ssh-keysign command.
RHEL 9 must audit all uses of the su command.
RHEL 9 must audit all uses of the sudo command.
RHEL 9 must audit all uses of the sudoedit command.
RHEL 9 must audit all uses of the unix_chkpwd command.
RHEL 9 must audit all uses of the unix_update command.
RHEL 9 must audit all uses of the userhelper command.
RHEL 9 must audit all uses of the usermod command.
RHEL 9 must audit all uses of the mount command.
Successful/unsuccessful uses of the umount system call in RHEL 9 must generate an audit record.
Successful/unsuccessful uses of the umount2 system call in RHEL 9 must generate an audit record.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
The SUSE operating system must generate audit records for all uses of the passwd command.
The SUSE operating system must generate audit records for all uses of the unix_chkpwd or unix2_chkpwd commands.
The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.
The SUSE operating system must generate audit records for all uses of the sudoedit command.
The SUSE operating system must generate audit records for all uses of the mount system call.
The SUSE operating system must generate audit records for all uses of the umount system call.
The SUSE operating system must generate audit records for all uses of the insmod command.
The SUSE operating system must generate audit records for all uses of the rmmod command.
The SUSE operating system must generate audit records for all uses of the modprobe command.
The SUSE operating system must generate audit records for all uses of the chcon command.
The SUSE operating system must generate audit records for all uses of the delete_module system call.
The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
The macOS system must configure the system to audit all authorization and authentication events.
The macOS system must be configured to audit all login and logout events.
The macOS system must be configured to audit all failed read actions on the system.
The macOS system must be configured to audit all failed write actions on the system.
The macOS system must be configured to audit all authorization and authentication events.
Ubuntu 22.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
The OL 8 audit package must be installed.
SLEM 5 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
SLEM 5 must generate audit records for all uses of the "chage" command.
SLEM 5 must generate audit records for all uses of the "chcon" command.
SLEM 5 must generate audit records for all uses of the "chfn" command.
SLEM 5 must generate audit records for all uses of the "chmod" command.
SLEM 5 must generate audit records for a uses of the "chsh" command.
SLEM 5 must generate audit records for all uses of the "crontab" command.
SLEM 5 must generate audit records for all uses of the "gpasswd" command.
SLEM 5 must generate audit records for all uses of the "insmod" command.
SLEM 5 must generate audit records for all uses of the "kmod" command.
SLEM 5 must generate audit records for all uses of the "modprobe" command.
SLEM 5 must generate audit records for all uses of the "newgrp" command.
SLEM 5 must generate audit records for all uses of the "pam_timestamp_check" command.
SLEM 5 must generate audit records for all uses of the "passwd" command.
SLEM 5 must generate audit records for all uses of the "rm" command.
SLEM 5 must generate audit records for all uses of the "rmmod" command.
SLEM 5 must generate audit records for all uses of the "ssh-agent" command.
SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.
SLEM 5 must generate audit records for all uses of the "su" command.
SLEM 5 must generate audit records for all uses of the "sudo" command.
SLEM 5 must generate audit records for all uses of the "sudoedit" command.
SLEM 5 must generate audit records for all uses of the "unix_chkpwd" or "unix2_chkpwd" commands.
SLEM 5 must generate audit records for all uses of the "usermod" command.
SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
SLEM 5 must generate audit records for all uses of the "delete_module" system call.
SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
SLEM 5 must generate audit records for all uses of the "mount" system call.
SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
SLEM 5 must generate audit records for all uses of the "umount" system call.
SLEM 5 must generate audit records for all modifications to the "lastlog" file.
SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
SLEM 5 must audit all uses of the sudoers file and all files in the "/etc/sudoers.d/" directory.
Successful/unsuccessful uses of the "chage" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chcon" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-agent in TOSS must generate an audit record.
Successful/unsuccessful uses of the "passwd" command in TOSS must generate an audit record.
Successful/unsuccessful uses of postdrop in TOSS must generate an audit record.
Successful/unsuccessful uses of postqueue in TOSS must generate an audit record.
Successful/unsuccessful uses of setsebool in TOSS must generate an audit record.
Successful/unsuccessful uses of the ssh-keysign in TOSS must generate an audit record.
Successful/unsuccessful uses of the "setfacl" command in RTOSS must generate an audit record.
Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "newgrp" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "init_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rename" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "renameat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "rmdir" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlink" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "unlinkat" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "finit_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "delete_module" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "crontab" command in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chsh" command in TOSS must generate an audit record.
Successful/unsuccessful uses of setfiles in TOSS must generate an audit record.
Successful/unsuccessful uses of the "chacl" command in TOSS must generate an audit record.