[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30475 Download | Alert*

Description:The operating system must generate audit records for successful/unsuccessful uses of the usermod command.Rationale:The usermod command modifies the system account files to reflect the changes that are specified on the command line. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and ...

Description: The audit log directory contains audit log files. Rationale: Audit information includes all information including: audit records, audit settings and audit reports. This information is needed to successfully audit system activity. This information must be protected from unauthorized modification or deletion. If this information were to be compromised, forensic analysis and discovery ...

Description:Journald supports the ability to receive messages from remote hosts, thus acting as a log server. Clients should not receive data from other hosts. Note: * The same package, systemd-journal-remote, is used for both sending logs to remote hosts and receiving incoming logs. * With regards to receiving logs, there are two services; systemd-journal-remote.socket and systemd-journal-remote. ...

Description: Journald will create logfiles that do not already exist on the system. This setting controls what permissions will be applied to these newly created files. Rationale: It is important to ensure that log files have the correct permissions to ensure that sensitive data is archived and protected. Audit: First see if there is an override file /etc/tmpfiles.d/systemd.conf. If so, this file ...

Description:The operating system must generate audit records for successful/unsuccessful uses of the chcon command.Rationale:The chcon command is used to change file security context. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify ...

Description:The operating system must generate audit records for successful/unsuccessful uses of the setfacl command.Rationale:This utility sets Access Control Lists (ACLs) of files and directories. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incide ...

Description:The operating system must generate audit records for successful/unsuccessful uses of the chacl command.Rationale:chacl changes the ACL(s) for a file or directory. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those res ...

Description: Audit log files contain information about the system and system activity. Rationale: Access to audit records can reveal system and configuration data to attackers, potentially compromising its confidentiality.Remediation: Run the following command to set permission on audit log files:chmod u-x,g-wx,o-rwx [audit log file name from /etc/audit/auditd.conf] Note: audit log file name is a ...

Description: Audit log files contain information about the system and system activity. Rationale: Access to audit records can reveal system and configuration data to attackers, potentially compromising its confidentiality.Remediation: Set the log_group parameter under /etc/audit/auditd.conf file to adm or rootRun the following command to restart the audit daemon to reload the configuration file ...

Description: Audit configuration files control auditd and what events are audited. Rationale: Access to the audit configuration files could allow unauthorized personnel to prevent the auditing of critical events. Misconfigured audit configuration files may prevent the auditing of critical events or impact the system's performance by overwhelming the audit log. Misconfiguration of the audit conf ...


Pages:      Start    20    21    22    23    24    25    26    27    28    29    30    31    32    33    ..   3047

© SecPod Technologies