The operating system must use cryptographic mechanisms to protect the integrity of audit tools.
22 rules found Severity: High
17 rules found Severity: High
15 rules found Severity: Medium