[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-14917-9

Platform: rhel5Date: (C)2011-10-07   (M)2016-04-05



Auditing should be configured to record unauthorized attempts to access files as appropriate.


Parameter: audit enabled / audit disabled


Technical Mechanism: via /etc/audit/audit.rules or auditctl

References:

Resource IdReference
NSA "Guide to the Secure Configuration of Red Hat Enterprise Linux 5" - Revision 4, September 14, 2010Section: 2.6.2.4.8 - Audit for Unauthorized Attempts to Access Files
SCAP Repo OVAL Definitionoval:gov.nist.usgcb.rhel:def:20164
HIPAA/HITECH ActHIPAA/HITECH Act
Jericho ForumJericho Forum
BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v6.0
FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL--FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL--
ISO/IEC 27001-2005ISO/IEC 27001-2005
COBIT 4.1COBIT 4.1
GAPP (Aug 2009)GAPP (Aug 2009)
NERC CIPNERC CIP
NIST SP800-53 R3NIST SP800-53 R3 AU-2
PCIDSS v2.0PCIDSS v2.0
FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL--FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL--
BITS Shared Assessments AUP v5.0BITS Shared Assessments AUP v5.0


CPE    1
cpe:/o:redhat:enterprise_linux:5
OVAL    1
oval:gov.nist.usgcb.rhel:def:20164
XCCDF    1
xccdf_gov.nist_benchmark_USGCB-RHEL-5-Desktop

© 2013 SecPod Technologies