
* Docs are now ordered by STIG ID number to make them easier to browse. * Deployer notes are better organized. * Script + CSV added for automated documentation generation. Implements: blueprint security-hardening Change-Id: Ib87bec701eddf1601574f4e027f301c775e5e1cd
17 lines
669 B
ReStructuredText
17 lines
669 B
ReStructuredText
V-38575: The audit system must be configured to audit user deletions of files and programs.
|
|
-------------------------------------------------------------------------------------------
|
|
|
|
Auditing file deletions will create an audit trail for files that are removed
|
|
from the system. The audit trail could aid in system troubleshooting, as well
|
|
as detecting malicious processes that attempt to delete log files to conceal
|
|
their presence.
|
|
|
|
Details: `V-38575 in STIG Viewer`_.
|
|
|
|
.. _V-38575 in STIG Viewer: https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2015-05-26/finding/V-38575
|
|
|
|
Notes for deployers
|
|
~~~~~~~~~~~~~~~~~~~
|
|
|
|
.. include:: developer-notes/V-38575.rst
|