V-38525: The audit system must be configured to audit all attempts to alter system time through stime. ------------------------------------------------------------------------------------------------------ Arbitrary changes to the system time can be used to obfuscate nefarious activities in log files, as well as to confuse network services that are highly dependent upon an accurate system time (such as sshd). All changes to the system time should be audited. Details: `V-38525 in STIG Viewer`_. .. _V-38525 in STIG Viewer: https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2015-05-26/finding/V-38525 Notes for deployers ~~~~~~~~~~~~~~~~~~~ .. include:: developer-notes/V-38525.rst