UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must take organization-defined list of least disruptive actions to terminate suspicious events.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000501-PF RHEL-06-000501-PF RHEL-06-000501-PF_rule Medium
Description
System availability is a key tenet of system security. Organizations need to have the flexibility to be able to define the automated actions taken in response to an identified incident. This includes being able to define a least disruptive action the operating system takes to terminate suspicious events. The least disruptive actions may include initiating a request for human response.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000501-PF_chk )
This is a permanent finding.
Fix Text (F-RHEL-06-000501-PF_fix)
This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed.