UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must prevent non-privileged users from circumventing intrusion detection and prevention capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000458-PNF RHEL-06-000458-PNF RHEL-06-000458-PNF_rule Medium
Description
Intrusion detection and prevention capabilities must be architected and implemented to prevent non-privileged users from circumventing such protections. This can be accomplished through the use of user roles, use of proper systems permissions, auditing, logging, etc.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000458-PNF_chk )
RHEL6 supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-RHEL-06-000458-PNF_fix)
This requirement is a permanent not a finding. No fix is required.