Skip to content

The operating system must generate audit records when successful/unsuccessful attempts to modify security objects occur.

An XCCDF Rule