UCF STIG Viewer Logo

The operating system must protect audit tools from unauthorized deletion.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33269 SRG-OS-000258-NA SV-43688r1_rule Medium
Description
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Rationale for non-applicability: A mobile OS typically does not have local audit or maintenance tools.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41566r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37199r1_fix)
The requirement is NA. No fix is required.