Record Events that Modify the System's Mandatory Access Controls
Record Events that Modify the System's Mandatory Access Controls in usr/share
Record Attempts to Alter Process and Session Initiation Information
Ensure auditd Collects System Administrator Actions
Record Events that Modify the System's Discretionary Access Controls - chmod
Record Events that Modify the System's Discretionary Access Controls - chown
Record Events that Modify the System's Discretionary Access Controls - fchmod
Record Events that Modify the System's Discretionary Access Controls - fchmodat
Record Events that Modify the System's Discretionary Access Controls - fchown
Record Events that Modify the System's Discretionary Access Controls - fchownat
Record Events that Modify the System's Discretionary Access Controls - fremovexattr
Record Events that Modify the System's Discretionary Access Controls - fsetxattr
Record Events that Modify the System's Discretionary Access Controls - lchown
Record Events that Modify the System's Discretionary Access Controls - lremovexattr
Record Events that Modify the System's Discretionary Access Controls - lsetxattr
Record Events that Modify the System's Discretionary Access Controls - removexattr
Record Events that Modify the System's Discretionary Access Controls - setxattr
Ensure auditd Collects File Deletion Events by User
Ensure auditd Collects File Deletion Events by User - rename
Ensure auditd Collects File Deletion Events by User - renameat
Ensure auditd Collects File Deletion Events by User - rmdir
Ensure auditd Collects File Deletion Events by User - unlink
Ensure auditd Collects File Deletion Events by User - unlinkat
Record Unsuccessful Access Attempts to Files - creat
Record Unsuccessful Access Attempts to Files - ftruncate
Record Unsuccessful Access Attempts to Files - open
Record Unsuccessful Access Attempts to Files - open_by_handle_at
Record Unsuccessful Access Attempts to Files - openat
Record Unsuccessful Access Attempts to Files - truncate
Ensure auditd Collects Information on Kernel Module Unloading - delete_module
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
Ensure auditd Collects Information on Kernel Module Loading - init_module
Record Events that Modify User/Group Information via open syscall - /etc/group
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/group
Record Events that Modify User/Group Information via openat syscall - /etc/group
Record Events that Modify User/Group Information via open syscall - /etc/gshadow
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/gshadow
Record Events that Modify User/Group Information via openat syscall - /etc/gshadow
Record Events that Modify User/Group Information via open syscall - /etc/passwd
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/passwd
Configure auditd to use audispd's syslog plugin
Record Events that Modify User/Group Information via openat syscall - /etc/passwd
Record Events that Modify User/Group Information via open syscall - /etc/shadow
Record Events that Modify User/Group Information via open_by_handle_at syscall - /etc/shadow
Record Events that Modify User/Group Information via openat syscall - /etc/shadow
Record Events that Modify User/Group Information - /etc/group
Record Events that Modify User/Group Information - /etc/gshadow
Record Events that Modify User/Group Information - /etc/security/opasswd
Record Events that Modify User/Group Information - /etc/passwd
Record Events that Modify User/Group Information - /etc/shadow
Record Access Events to Audit Log Directory
Ensure Logs Sent To Remote Host
Record Any Attempts to Run chcon
Record Any Attempts to Run restorecon
Record Any Attempts to Run semanage
Record Any Attempts to Run setsebool
Record Any Attempts to Run seunshare
Record Unsuccessful Creation Attempts to Files - open_by_handle_at O_CREAT
Record Unsuccessful Modification Attempts to Files - open_by_handle_at O_TRUNC_WRITE
Ensure auditd Unauthorized Access Attempts To open_by_handle_at Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - open O_CREAT
Record Unsuccessful Modification Attempts to Files - open O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To open Are Ordered Correctly
Record Unsuccessful Creation Attempts to Files - openat O_CREAT
Record Unsuccessful Modification Attempts to Files - openat O_TRUNC_WRITE
Ensure auditd Rules For Unauthorized Attempts To openat Are Ordered Correctly
Record Unsuccessful Delete Attempts to Files - rename
Record Unsuccessful Delete Attempts to Files - renameat
Record Unsuccessful Delete Attempts to Files - unlink
Record Unsuccessful Delete Attempts to Files - unlinkat
Record Attempts to Alter Logon and Logout Events - faillock
Record Attempts to Alter Logon and Logout Events - lastlog
Record Attempts to Alter Logon and Logout Events - tallylog
Ensure auditd Collects Information on the Use of Privileged Commands - at
Ensure auditd Collects Information on the Use of Privileged Commands - gpasswd
Ensure auditd Collects Information on the Use of Privileged Commands - mount
Ensure auditd Collects Information on the Use of Privileged Commands - newgidmap
Ensure auditd Collects Information on the Use of Privileged Commands - newgrp
Ensure auditd Collects Information on the Use of Privileged Commands - newuidmap
Ensure auditd Collects Information on the Use of Privileged Commands - passwd
Ensure auditd Collects Information on the Use of Privileged Commands - ssh-keysign
Ensure auditd Collects Information on the Use of Privileged Commands - su
Ensure auditd Collects Information on the Use of Privileged Commands - sudo
Ensure auditd Collects Information on the Use of Privileged Commands - sudoedit
Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
Ensure auditd Collects Information on the Use of Privileged Commands - userhelper
Ensure auditd Collects Information on the Use of Privileged Commands - usernetctl
Configure audispd Plugin To Send Logs To Remote Server
Encrypt Audit Records Sent With audispd Plugin
Configure audit according to OSPP requirements
Ensure cron Is Logging To Rsyslog
Configure auditing of unsuccessful file accesses
Configure auditing of successful file accesses
Configure auditing of unsuccessful file creations
Configure auditing of successful file creations
Configure auditing of unsuccessful file deletions
Configure auditing of successful file deletions
Configure auditing of unsuccessful file modifications
Configure auditing of successful file modifications
Configure auditing of loading and unloading of kernel modules
Perform general configuration of Audit for OSPP
Configure auditing of unsuccessful ownership changes
Configure auditing of successful ownership changes
Configure auditing of unsuccessful permission changes
Configure auditing of successful permission changes
Configure auditing of unsuccessful file accesses (AArch64)
Configure auditing of unsuccessful file accesses (ppc64le)
Configure auditing of successful file accesses (AArch64)
Configure auditing of successful file accesses (ppc64le)
Configure auditing of unsuccessful file creations (AArch64)
Configure auditing of unsuccessful file creations (ppc64le)
Configure auditing of successful file creations (AArch64)
Configure auditing of successful file creations (ppc64le)
Configure auditing of unsuccessful file deletions (AArch64)
Configure auditing of unsuccessful file deletions (ppc64le)
Configure auditing of successful file deletions (AArch64)
Configure auditing of successful file deletions (ppc64le)
Configure auditing of unsuccessful file modifications (AARch64)
Configure auditing of unsuccessful file modifications (ppc64le)
Configure auditing of successful file modifications (AArch64)
Configure auditing of successful file modifications (ppc64le)
Configure auditing of loading and unloading of kernel modules (ppc64le)
Perform general configuration of Audit for OSPP (AArch64)
Perform general configuration of Audit for OSPP (ppc64le)
Configure auditing of unsuccessful ownership changes (AArch64)
Configure auditing of unsuccessful ownership changes (ppc64le)
Configure auditing of successful ownership changes (AArch64)
Configure auditing of successful ownership changes (ppc64le)
Configure auditing of unsuccessful permission changes (AArch64)
Configure auditing of unsuccessful permission changes (ppc64le)
Configure auditing of successful permission changes (AArch64)
Configure auditing of successful permission changes (ppc64le)
Ensure auditd Collects Information on the Use of Privileged Commands - unix2_chkpwd