The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.
An XCCDF Rule
Description
Without auditing, malicious activity cannot be detected.
- ID
- SV-216028r959010_rule
- Version
- SOL-11.1-010290
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
The Audit Configuration profile is required. All audit flags must be enabled in a single command.
This action applies to the global zone only. Determine the zone currently being secured.
# zonename