UCF STIG Viewer Logo

The operating system must prevent non-privileged users from circumventing intrusion detection and prevention capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28937 SRG-OS-000197 SV-36928r1_rule Medium
Description
Intrusion detection and prevention capabilities must be architected and implemented to prevent non-privileged users from circumventing such protections. This can be accomplished through the use of user roles, use of proper systems permissions, auditing, logging, etc.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None