The operating system must protect audit information from unauthorized modification.
34 rules found Severity: Medium
31 rules found Severity: Medium
44 rules found Severity: Medium
20 rules found Severity: Medium
13 rules found Severity: Medium
8 rules found Severity: Medium
15 rules found Severity: Medium
1 rule found Severity: Medium
3 rules found Severity: Medium