Skip to content

Database software, applications, and configuration files must be monitored to discover unauthorized changes.

An XCCDF Rule