Skip to content

PCI-DSS v3.2.1 Control Baseline for SUSE Linux enterprise 15

Rules and Groups employed by this XCCDF Profile

  • Ensure auditd Collects File Deletion Events by User - rmdir

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - unlink

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Ensure auditd Collects File Deletion Events by User - unlinkat

    At a minimum, the audit system should collect file deletion events for all users and root. If the <code>auditd</code> daemon is configured to use t...
    Rule Medium Severity
  • Record Unauthorized Access Attempts Events to Files (unsuccessful)

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. Note that the "-F arch=b32" lines should be presen...
    Group
  • Ensure auditd Collects Unauthorized Access Attempts to Files (unsuccessful)

    At a minimum the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to ...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - creat

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - ftruncate

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - open_by_handle_at

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - openat

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - rename

    The audit system should collect unsuccessful file deletion attempts for all users and root. If the <code>auditd</code> daemon is configured to use ...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - renameat

    The operating system must generate audit records for all uses of the <code>renameat</code> system call. Without generating audit records specific ...
    Rule Medium Severity
  • Record Unsuccessful Access Attempts to Files - truncate

    At a minimum, the audit system should collect unauthorized file accesses for all users and root. If the <code>auditd</code> daemon is configured to...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - unlink

    The operating system must generate audit records for all uses of the <code>unlink</code> system call. Without generating audit records specific to...
    Rule Medium Severity
  • Record Unsuccessful Delete Attempts to Files - unlinkat

    The operating system must generate audit records for all uses of the <code>unlinkat</code> system call. Without generating audit records specific ...
    Rule Medium Severity
  • Record Information on Kernel Modules Loading and Unloading

    To capture kernel module loading and unloading events, use following lines, setting ARCH to either b32 for 32-bit system, or having two lines for b...
    Group
  • Ensure auditd Collects Information on Kernel Module Loading and Unloading

    To capture kernel module loading and unloading events, use following lines, setting ARCH to either b32 for 32-bit system, or having two lines for b...
    Rule Medium Severity
  • Ensure auditd Collects Information on Kernel Module Unloading - delete_module

    To capture kernel module unloading events, use following line, setting ARCH to either b32 for 32-bit system, or having two lines for both b32 and b...
    Rule Medium Severity
  • Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module

    If the <code>auditd</code> daemon is configured to use the <code>augenrules</code> program to read audit rules during daemon startup (the default),...
    Rule Medium Severity
  • Ensure auditd Collects Information on Kernel Module Loading - init_module

    To capture kernel module loading events, use following line, setting ARCH to either b32 for 32-bit system, or having two lines for both b32 and b64...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules