UCF STIG Viewer Logo

The operating system must protect audit tools from unauthorized modification.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33268 SRG-OS-000257-NA SV-43687r1_rule Medium
Description
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Rationale for non-applicability: A mobile OS typically does not have local audit or maintenance tools.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41565r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37198r1_fix)
The requirement is NA. No fix is required.