Skip to content

The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.

An XCCDF Rule

Description

Without auditing, malicious activity cannot be detected.

ID
SV-216263r959010_rule
Version
SOL-11.1-010290
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

The Audit Configuration profile is required. All audit flags must be enabled in a single command.

This action applies to the global zone only. Determine the zone currently being secured.

# zonename