The HYCU virtual appliance must produce audit log records containing sufficient information to establish what type of event occurred.
An XCCDF Rule
Description
It is essential for security personnel to know what is being done, what was attempted, where it was done, when it was done, and by whom it was done to compile an accurate risk assessment. Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource usage or capacity thresholds; or identifying an improperly configured network device. Without this capability, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.
- ID
- SV-268247r1038776_rule
- Version
- HYCU-ND-000350
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Audit logging is enabled by default within the HYCU VM console. If an administrator disabled it, reenable it by logging in to the HYCU VM console and running the following command:
chkconfig auditd on
Use the following command to review the logs:
cat /var/log/secure | less