Solaris 11 SPARC Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SOL-11.1-010040
- Vuln IDs
- V-47781
- Rule IDs
- SV-60657r1_rule
Fix: F-51401r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000156
- Version
- SOL-11.1-010060
- Vuln IDs
- V-47783
- Rule IDs
- SV-60659r1_rule
Fix: F-51403r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000157
- Version
- SOL-11.1-010070
- Vuln IDs
- V-47785
- Rule IDs
- SV-60661r1_rule
Fix: F-51405r2_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SOL-11.1-010080
- Vuln IDs
- V-47787
- Rule IDs
- SV-60663r1_rule
Fix: F-51407r2_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SOL-11.1-010100
- Vuln IDs
- V-47789
- Rule IDs
- SV-60665r1_rule
Fix: F-51409r2_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SOL-11.1-010120
- Vuln IDs
- V-47791
- Rule IDs
- SV-60667r1_rule
Fix: F-51411r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- SOL-11.1-010130
- Vuln IDs
- V-47793
- Rule IDs
- SV-60669r1_rule
Fix: F-51413r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SOL-11.1-010140
- Vuln IDs
- V-47795
- Rule IDs
- SV-60671r1_rule
Fix: F-51415r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SOL-11.1-010150
- Vuln IDs
- V-47797
- Rule IDs
- SV-60673r1_rule
Fix: F-51417r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SOL-11.1-010160
- Vuln IDs
- V-47799
- Rule IDs
- SV-60675r1_rule
Fix: F-51419r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SOL-11.1-010170
- Vuln IDs
- V-47801
- Rule IDs
- SV-60677r1_rule
Fix: F-51421r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SOL-11.1-010180
- Vuln IDs
- V-47803
- Rule IDs
- SV-60679r1_rule
Fix: F-51423r1_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000143
- Version
- SOL-11.1-010370
- Vuln IDs
- V-47835
- Rule IDs
- SV-60709r1_rule
Fix: F-51453r1_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000144
- Version
- SOL-11.1-010380
- Vuln IDs
- V-47843
- Rule IDs
- SV-60717r1_rule
Fix: F-51461r1_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000139
- Version
- SOL-11.1-010390
- Vuln IDs
- V-47845
- Rule IDs
- SV-60719r1_rule
Fix: F-51463r1_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-020090
- Vuln IDs
- V-47893
- Rule IDs
- SV-60765r1_rule
Fix: F-51505r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall service/network/finger
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-100020
- Vuln IDs
- V-47895
- Rule IDs
- SV-60767r3_rule
Fix: F-51507r1_fix
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The Zone Security profile is required: Change the "limitpriv" setting to default. # pfexec zonecfg -z [zone] set limitpriv=default
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-100010
- Vuln IDs
- V-47897
- Rule IDs
- SV-60769r1_rule
Fix: F-51509r3_fix
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The Software Installation profile is required. Change the ownership and permissions of the files and directories to the factory default. # pkg fix system/zones
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020100
- Vuln IDs
- V-47901
- Rule IDs
- SV-60773r1_rule
Fix: F-51513r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall service/network/legacy-remote-utilities
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-020110
- Vuln IDs
- V-47905
- Rule IDs
- SV-60777r1_rule
Fix: F-51517r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall service/network/nis
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-020120
- Vuln IDs
- V-47909
- Rule IDs
- SV-60781r1_rule
Fix: F-51521r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall communication/im/pidgin
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-020130
- Vuln IDs
- V-47911
- Rule IDs
- SV-60783r1_rule
Fix: F-51523r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall service/network/ftp
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-020140
- Vuln IDs
- V-47913
- Rule IDs
- SV-60785r2_rule
Fix: F-51525r2_fix
The Software Installation Profile is required. # pfexec pkg uninstall install/installadm # pfexec pkg uninstall service/network/tftp
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-020150
- Vuln IDs
- V-47915
- Rule IDs
- SV-60787r2_rule
Fix: F-51527r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall service/network/telnet
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-020160
- Vuln IDs
- V-47917
- Rule IDs
- SV-60789r2_rule
Fix: F-51529r3_fix
The Software Installation Profile is required. # pfexec pkg uninstall /service/network/uucp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020180
- Vuln IDs
- V-47921
- Rule IDs
- SV-60793r1_rule
Fix: F-51533r1_fix
The Software Installation Profile is required. # pfexec pkg uninstall x11/server/xvnc
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000087
- Version
- SOL-11.1-030060
- Vuln IDs
- V-47939
- Rule IDs
- SV-60811r1_rule
Fix: F-51551r1_fix
The Service Management profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Disable the rmvolmgr service. # pfexec svcadm disable svc:/system/filesystem/rmvolmgr:default
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SOL-11.1-040040
- Vuln IDs
- V-47957
- Rule IDs
- SV-60829r1_rule
Fix: F-51569r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: PASSLENGTH Change the line to read PASSLENGTH=15
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SOL-11.1-040050
- Vuln IDs
- V-47961
- Rule IDs
- SV-60833r1_rule
Fix: F-51573r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: HISTORY Change the line to read: HISTORY=5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SOL-11.1-040060
- Vuln IDs
- V-47967
- Rule IDs
- SV-60839r2_rule
Fix: F-51579r1_fix
The root role is required. # pfedit /etc/default/passwd Search for MINDIFF. Change the line to read: MINDIFF=8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SOL-11.1-040070
- Vuln IDs
- V-47971
- Rule IDs
- SV-60843r1_rule
Fix: F-51583r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINUPPER Change the line to read: MINUPPER=1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SOL-11.1-040080
- Vuln IDs
- V-47981
- Rule IDs
- SV-60853r1_rule
Fix: F-51593r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINLOWER Change the line to read: MINLOWER=1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SOL-11.1-040090
- Vuln IDs
- V-47989
- Rule IDs
- SV-60861r1_rule
Fix: F-51601r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINDIGIT Change the line to read: MINDIGIT=1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SOL-11.1-040100
- Vuln IDs
- V-47991
- Rule IDs
- SV-60863r1_rule
Fix: F-51603r1_fix
The root role is required. # pfedit /etc/default/passwd a Locate the line containing: MINSPECIAL Change the line to read: MINSPECIAL=1
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040110
- Vuln IDs
- V-47993
- Rule IDs
- SV-60865r1_rule
Fix: F-51605r1_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MAXREPEATS Change the line to read: MAXREPEATS=3
- RMF Control
- CP-10
- Severity
- M
- CCI
- CCI-000553
- Version
- SOL-11.1-080150
- Vuln IDs
- V-47997
- Rule IDs
- SV-60869r1_rule
Fix: F-51609r1_fix
The root role is required. Solaris 11 ZFS copy-on-write model allows filesystem accesses to work according to a transactional model, such that on-disk content is always consistent and cannot be configured to be out of compliance. If any UFS file systems are mounted with the "nologging" options, remove that option from the /etc/vfstab file. # pfedit /etc/vfstab Locate any file systems listed with the "nologging" option and delete the keyword "nologging".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040120
- Vuln IDs
- V-47999
- Rule IDs
- SV-60871r1_rule
Fix: F-51611r1_fix
The root role is required. Remove, lock, or configure a password for any account with a blank password. # passwd [username] or Use the passwd -l command to lock accounts that are not permitted to execute commands. or Use the passwd -N command to set accounts to be non-login.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-080010
- Vuln IDs
- V-48027
- Rule IDs
- SV-60899r1_rule
Fix: F-51639r1_fix
Upgrade to a supported version of the operating system.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001314
- Version
- SOL-11.1-070240
- Vuln IDs
- V-48033
- Rule IDs
- SV-60905r2_rule
Fix: F-51645r2_fix
The root role is required. Change the permissions and owner on the /var/adm/messages file: # chmod 640 /var/adm/messages # chown root /var/adm/messages # chgrp root /var/adm/messages Change the permissions and owner on the /var/adm directory: # chmod 750 /var/adm # chown root /var/adm # chgrp sys /var/adm
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070220
- Vuln IDs
- V-48035
- Rule IDs
- SV-60907r1_rule
Fix: F-51647r1_fix
The root role is required. Change the default GID of non-root accounts to a valid GID other than 0.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040160
- Vuln IDs
- V-48043
- Rule IDs
- SV-60915r1_rule
Fix: F-51655r1_fix
The root role is required. # pfedit the /etc/default/login Locate the line containing: SLEEPTIME Change the line to read: SLEEPTIME=4
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SOL-11.1-040170
- Vuln IDs
- V-48045
- Rule IDs
- SV-60917r4_rule
Fix: F-51657r3_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout: 0:00:05 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout: 0:00:05 lock: True
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SOL-11.1-040180
- Vuln IDs
- V-48047
- Rule IDs
- SV-60919r2_rule
Fix: F-51659r1_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout:0:15:00 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout:0:15:00 lock: True
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040190
- Vuln IDs
- V-48053
- Rule IDs
- SV-60925r1_rule
Fix: F-51661r1_fix
The root role is required. # pfedit /etc/default/passwd Insert the lines: DICTIONLIST=/usr/share/lib/dict/words DICTIONDBDIR=/var/passwd Generate the password dictionary by running the mkpwdict command. # mkpwdict -s /usr/share/lib/dict/words
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- SOL-11.1-040200
- Vuln IDs
- V-48055
- Rule IDs
- SV-60927r2_rule
Fix: F-51663r2_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SOL-11.1-040230
- Vuln IDs
- V-48057
- Rule IDs
- SV-60929r2_rule
Fix: F-51665r2_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040250
- Vuln IDs
- V-48061
- Rule IDs
- SV-60933r2_rule
Fix: F-51667r2_fix
The root role is required. Edit local and global initialization files containing "umask" and change them to use 077. # pfedit /etc/default/login Insert the line UMASK=077 # pfedit [user initialization file] Insert the line umask 077
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070170
- Vuln IDs
- V-48065
- Rule IDs
- SV-60937r1_rule
Fix: F-51673r1_fix
The root role is required. Remove any .forward files that are found. # pfexec rm [filename]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070160
- Vuln IDs
- V-48067
- Rule IDs
- SV-60939r2_rule
Fix: F-51675r1_fix
The root role is required. Determine if any .netrc files exist, and work with the owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040260
- Vuln IDs
- V-48071
- Rule IDs
- SV-60943r1_rule
Fix: F-51679r1_fix
The root role is required. # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. Otherwise, edit the FTP configuration file. # pfedit /etc/proftpd.conf Locate the line containing: Umask Change the line to read: Umask 077
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070130
- Vuln IDs
- V-48077
- Rule IDs
- SV-60949r5_rule
Fix: F-51685r1_fix
The root role is required. Correct or justify any items discovered in the Check step. Determine if there are any accounts using these reserved UIDs, and work with their owners to determine the best course of action in accordance with site policy. This may require deleting users or changing UIDs for users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040310
- Vuln IDs
- V-48087
- Rule IDs
- SV-60959r1_rule
Fix: F-51695r1_fix
The Service Operator profile is required. Disable serial terminal services. # pfexec svcadm disable svc:/system/console-login:terma # pfexec svcadm disable svc:/system/console-login:termb
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040320
- Vuln IDs
- V-48089
- Rule IDs
- SV-60961r1_rule
Fix: F-51697r1_fix
The root role is required. Modify the /etc/default/keyserv file. # pfedit /etc/default/keyserv Locate the line: #ENABLE_NOBODY_KEYS=YES Change it to: ENABLE_NOBODY_KEYS=NO
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040330
- Vuln IDs
- V-48093
- Rule IDs
- SV-60965r1_rule
Fix: F-51701r1_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the line containing: X11Forwarding Change it to: X11Forwarding no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040340
- Vuln IDs
- V-48099
- Rule IDs
- SV-60971r1_rule
Fix: F-51707r1_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the line containing: MaxAuthTries Change it to: MaxAuthTries 6 Restart the SSH service. # svcadm restart svc:/network/ssh Note: Solaris SSH MaxAuthTries of 6 maps to 3 actual failed attempts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040350
- Vuln IDs
- V-48101
- Rule IDs
- SV-60973r1_rule
Fix: F-51709r1_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: IgnoreRhosts Change it to: IgnoreRhosts yes Restart the SSH service. # svcadm restart svc:/network/ssh This action will only set the IgnoreRhosts line if it already exists in the file to ensure that it is set to the proper value. If the IgnoreRhosts line does not exist in the file, the default setting of "Yes" is automatically used, so no additional changes are needed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040360
- Vuln IDs
- V-48103
- Rule IDs
- SV-60975r1_rule
Fix: F-51713r1_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitRootLogin Change it to: PermitRootLogin no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040370
- Vuln IDs
- V-48107
- Rule IDs
- SV-60979r1_rule
Fix: F-51715r1_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitEmptyPasswords/ Change it to: PermitEmptyPasswords/ no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-070070
- Vuln IDs
- V-48109
- Rule IDs
- SV-60981r1_rule
Fix: F-51717r1_fix
The root role is required. Correct or justify any items discovered in the check step. Determine if there exists any users who are in passwd but do not have a home directory, and work with those users to determine the best course of action in accordance with site policy. This generally means deleting the user or creating a valid home directory.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- SOL-11.1-040380
- Vuln IDs
- V-48111
- Rule IDs
- SV-60983r2_rule
Fix: F-51719r2_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. Modify the sshd_config file: # pfedit /etc/ssh/sshd_config Modify or add the lines containing: ClientAliveInterval ClientAliveCountMax Change them to: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service: # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040390
- Vuln IDs
- V-48113
- Rule IDs
- SV-60985r4_rule
Fix: F-51721r3_fix
Note: This is the location for Solaris 11.1. For earlier versions, the information is in /etc/pam.conf. The root role is required. # ls -l /etc/pam.d to identify the various configuration files used by PAM. Search each file for the pam_rhosts_auth.so.1 entry. # grep pam_rhosts_auth.so.1 [filename] Identify the file with the line pam_hosts_auth.so.1 in it. # pfedit [filename] Insert a comment character (#) at the beginning of the line containing "pam_hosts_auth.so.1".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070060
- Vuln IDs
- V-48115
- Rule IDs
- SV-60987r1_rule
Fix: F-51723r1_fix
The root role is required. Correct or justify any items discovered in the Audit step. Determine if any groups are in passwd but not in group, and work with those users or group owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040400
- Vuln IDs
- V-48117
- Rule IDs
- SV-60989r1_rule
Fix: F-51725r2_fix
The root role is required. Determine if the FTP server package is installed: # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. # for user in `logins -s | awk '{ print $1 }'` \ aiuser noaccess nobody nobody4; do $(echo $user >> /etc/ftpd/ftpusers) done # sort -u /etc/ftpd/ftpusers > /etc/ftpd/ftpusers.temp # mv /etc/ftpd/ftpusers.temp /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-070050
- Vuln IDs
- V-48119
- Rule IDs
- SV-60991r1_rule
Fix: F-51727r1_fix
The root role is required. Remove any .rhosts files found. # rm [file name]
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040410
- Vuln IDs
- V-48121
- Rule IDs
- SV-60993r1_rule
Fix: F-51729r1_fix
The root role is required. Modify the /etc/pam.d/gdm-autologin file. # pfedit /etc/pam.d/gdm-autologin Locate the lines: auth required pam_unix_cred.so.1 auth sufficient pam_allow.so.1 account sufficient pam_allow.so.1 Change the lines to read: #auth required pam_unix_cred.so.1 #auth sufficient pam_allow.so.1 #account sufficient pam_allow.so.1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070040
- Vuln IDs
- V-48123
- Rule IDs
- SV-60995r1_rule
Fix: F-51731r1_fix
The root role is required. Change the permissions on users' .netrc files to 750 or less permissive. # chmod 750 [file name]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040430
- Vuln IDs
- V-48127
- Rule IDs
- SV-60999r1_rule
Fix: F-51735r1_fix
The root role is required. Modify the /etc/default/login file # pfedit /etc/default/login Locate the line containing: CONSOLE Change it to read: CONSOLE=/dev/console
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- SOL-11.1-040450
- Vuln IDs
- V-48131
- Rule IDs
- SV-61003r1_rule
Fix: F-51739r1_fix
The root role is required for this action. # pfedit /etc/ssh/sshd_config Locate the line containing: PrintLastLog no and place a comment sign ("# ")at the beginning of the line or delete the line # PrintLastLog no Restart the ssh service # pfexec svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070020
- Vuln IDs
- V-48133
- Rule IDs
- SV-61005r1_rule
Fix: F-51741r1_fix
The root role is required. Change the permissions on users' directories to 750 or less permissive. # chmod 750 [directory name]
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SOL-11.1-040470
- Vuln IDs
- V-48139
- Rule IDs
- SV-61011r2_rule
Fix: F-51747r3_fix
For Solaris 11, 11.1, 11.2, and 11.3: In the GNOME 2 desktop: System >> Preferences >> Screensaver. For Solaris 11.4 or newer: If using the default GNOME desktop: Activities >> Show Applications >> select “Screensaver” icon. If using the GNOME Classic desktop: Applications >> Other >> Screensaver. Click on Mode's pull-down. Select: "Blank Screen Only". Ensure that "Blank Screen Only" is selected.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040480
- Vuln IDs
- V-48143
- Rule IDs
- SV-61015r1_rule
Fix: F-51751r1_fix
The root role is required. Modify the /etc/default/login file. # pfedit /etc/default/login Insert the line: PASSREQ=YES
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SOL-11.1-050460
- Vuln IDs
- V-48195
- Rule IDs
- SV-61067r1_rule
Fix: F-51803r2_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. # pfedit /etc/ssh/sshd_config Insert the two lines: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service with the new configuration. # svcadm restart svc:/network/ssh
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SOL-11.1-050430
- Vuln IDs
- V-48199
- Rule IDs
- SV-61071r1_rule
Fix: F-51807r2_fix
The root role is required. The package: pkg:/service/network/ftp must be installed. # pfedit /etc/issue Insert the proper DoD banner message text. The DoD required text is: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." # echo "DisplayConnect /etc/issue" >> /etc/proftpd.conf # svcadm restart ftp
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SOL-11.1-050410
- Vuln IDs
- V-48203
- Rule IDs
- SV-61075r1_rule
Fix: F-51809r1_fix
The root role is required. If the system does not use XWindows, this is not applicable. # pfedit /etc/issue Insert the proper DoD banner message text. The DoD required text is: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." # pfedit /etc/gdm/Init/Default Add the following content before the "exit 0" line of the file. /usr/bin/zenity --text-info --width=800 --height=300 \ --title="Security Message" --filename=/etc/issue
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SOL-11.1-050390
- Vuln IDs
- V-48205
- Rule IDs
- SV-61077r1_rule
Fix: F-51815r1_fix
The root role is required. Edit the SSH configuration file. # pfedit /etc/ssh/sshd_config Locate the file containing: Banner Change the line to read: Banner /etc/issue Edit the /etc/issue file # pfedit /etc/issue The DoD required text is: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Restart the SSH service # svcadm restart svc:/network/ssh
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SOL-11.1-050380
- Vuln IDs
- V-48209
- Rule IDs
- SV-61081r1_rule
Fix: F-51817r1_fix
The root role is required. Edit the contents of these two files and ensure that the proper DoD banner message is viewable. # pfedit /etc/motd # pfedit /etc/issue The DoD required text is: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SOL-11.1-040130
- Vuln IDs
- V-48243
- Rule IDs
- SV-61115r4_rule
Fix: F-51851r3_fix
The root role is required. Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash. # pfedit /etc/security/policy.conf Check that the lines: CRYPT_DEFAULT=6 CRYPT_ALGORITHMS_ALLOW=5,6 exist and are not commented out.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SOL-11.1-040140
- Vuln IDs
- V-48245
- Rule IDs
- SV-61117r1_rule
Fix: F-51853r1_fix
The root role is required. # pfedit /etc/default/login Change the line: #RETRIES=5 to read RETRIES=3 pfedit /etc/security/policy.conf Change the line containing #LOCK_AFTER_RETRIES to read: LOCK_AFTER_RETRIES=YES If a user has lock_after_retries set to "no", update the user's attributes using the command: # usermod -K lock_after_retries=yes [username]
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000085
- Version
- SOL-11.1-120410
- Vuln IDs
- V-49635
- Rule IDs
- SV-62559r1_rule
Fix: F-53137r1_fix
The root role is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global" this check applies. Modify the /etc/system file. # pfedit /etc/system Add a line containing: exclude: scsa2usb Note that the global zone will need to be rebooted for this change to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020300
- Vuln IDs
- V-59827
- Rule IDs
- SV-74257r1_rule
Fix: F-65237r1_fix
Ensure all system startup files have mode 0755 or less permissive. Examine the rc files, and all files in the rc1.d (rc2.d, and so on) directories, and in the /etc/init.d and /lib/svc/method directories to ensure they are not world writable. If they are world writable, use the chmod command to correct the vulnerability and to research why. Procedure: # chmod go-w <startupfile>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020320
- Vuln IDs
- V-59831
- Rule IDs
- SV-74261r3_rule
Fix: F-65241r2_fix
Edit the run control script and remove the relative path entries from the executable search path variable that have not been documented with the ISSO. Edit the run control script and remove any empty path entries from the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020360
- Vuln IDs
- V-59839
- Rule IDs
- SV-74269r1_rule
Fix: F-65249r1_fix
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020370
- Vuln IDs
- V-59841
- Rule IDs
- SV-74271r1_rule
Fix: F-65251r1_fix
Change the group ownership of the run control script(s) with incorrect group ownership. Procedure: # chgrp root <run control script>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-000225
- Version
- SOL-11.1-020510
- Vuln IDs
- V-61005
- Rule IDs
- SV-75473r2_rule
Fix: F-66737r1_fix
Change the mode of the .Xauthority files. Procedure: # chmod 0600 .Xauthority