Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-30387 | SRG-OS-000278 | SV-40054r1_rule | Medium |
Description |
---|
Auditing and logging are key components of any security architecture. It is essential security personnel know what is being done, what attempted to be done, where it was done, when it was done, and by whom in order to compile an accurate risk assessment. Cryptographic mechanisms must be used to protect the integrity of the audit tools used for audit reduction and reporting. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |