Monterey – Configure System to Audit All Authorization and Authentication Events Details The auditing system _MUST_ be configured to flag authorization and authentication (aa) events. Authentication events contain information about the...
Monterey – Configure System to Audit All Deletions of Object Attributes Details The audit system _MUST_ be configured to record enforcement actions of attempts to delete file attributes (fd). ***Enforcement actions...
Monterey – Configure System to Audit All Failed Program Execution on the System Details The audit system _MUST_ be configured to record enforcement actions of access restrictions, including failed program execute (-ex) attempts....
Monterey – Configure System to Audit All Failed Read Actions on the System Details The audit system _MUST_ be configured to record enforcement actions of access restrictions, including failed file read (-fr) attempts....
Monterey – Configure System to Audit All Failed Write Actions on the System Details The audit system _MUST_ be configured to record enforcement actions of access restrictions, including failed file write (-fw) attempts....
Monterey – Configure System to Audit All Log In and Log Out Events Details The audit system _MUST_ be configured to record all attempts to log in and out of the system (lo)....
Monterey – Configure System to Shut Down Upon Audit Failure Details The audit service _MUST_ be configured to shut down the computer if it is unable to audit system events....
Monterey – Configure the System for Nonlocal Maintenance Details Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network...
Monterey – Configure the System to Block Non-Privileged Users from Executing Privileged Functions Details The information system _IS_ configured to block standard users from executing privileged functions. Privileged functions include disabling, circumventing, or...
Monterey – Configure the System to Implement Approved Cryptography to Protect Information Details The information system _IS_ configured to implement approved cryptography to protect information. Use of weak or untested encryption algorithms...