SRG-OS-000063-GPOS-00032 Controls

STIG ID Version Title Product
RHEL-08-030610 V1R3 RHEL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
UBTU-20-010133 V1R12 The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.
UBTU-20-010134 V1R12 The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.
UBTU-20-010135 V1R12 The Ubuntu operating system must permit only authorized groups to own the audit configuration files.
UBTU-22-653065 V2R2 Ubuntu 22.04 LTS must be configured so that audit configuration files are not write-accessible by unauthorized users.
UBTU-22-653070 V2R2 Ubuntu 22.04 LTS must permit only authorized accounts to own the audit configuration files.
UBTU-22-653075 V2R2 Ubuntu 22.04 LTS must permit only authorized groups to own the audit configuration files.
RHEL-09-653110 V1R3 RHEL 9 must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
RHEL-09-653115 V1R3 RHEL 9 /etc/audit/auditd.conf file must have 0640 or less permissive to prevent unauthorized access.
OL08-00-030610 V1R3 OL 8 must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
UBTU-18-010311 V2R11 The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.
UBTU-18-010312 V2R11 The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.
UBTU-18-010313 V2R11 The Ubuntu operating system must permit only authorized groups to own the audit configuration files.