STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

V-811

CAT II (Medium)

Auditing must be implemented.

Rule ID

SV-45207r1_rule

STIG

SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide

Version

V1R12

CCIs

CCI-000169

Discussion

Without auditing, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account.

Check Content

Determine if auditing is enabled.
# ps -ef |grep auditd 
If the auditd process is not found, this is a finding.

Fix Text

Start the auditd service and set it to start on boot.
# service auditd start ; chkconfig auditd on