The operating system must protect audit tools from unauthorized access.
12 rules found Severity: Medium