STIG-A-View
STIG ID | Version | Title | Product |
---|---|---|---|
UBTU-24-900510 | V1R1 | Ubuntu 24.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur. | |
UBTU-24-900520 | V1R1 | Ubuntu 24.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur. | |
WN11-AU-000115 | V2R1 | The system must be configured to audit Privilege Use - Sensitive Privilege Use successes. | |
WN11-AU-000140 | V2R1 | The system must be configured to audit System - Security State Change successes. | |
WN11-AU-000150 | V2R1 | The system must be configured to audit System - Security System Extension successes. | |
UBTU-22-654220 | V2R1 | Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur. | |
UBTU-22-654225 | V2R1 | Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur. | |
RHEL-07-030910 | V3R8 | The Red Hat Enterprise Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls. | |
OL07-00-030910 | V2R14 | The Oracle Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls. |