Solaris 11 SPARC STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SOL-11.1-010040
- Vuln IDs
- V-216246
- Rule IDs
- SV-216246r986419_rule
Fix: F-17480r986418_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone to be secured. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SOL-11.1-010080
- Vuln IDs
- V-216249
- Rule IDs
- SV-216249r958430_rule
Fix: F-17483r370836_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SOL-11.1-010120
- Vuln IDs
- V-216251
- Rule IDs
- SV-216251r958446_rule
Fix: F-17485r370842_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SOL-11.1-010140
- Vuln IDs
- V-216253
- Rule IDs
- SV-216253r958412_rule
Fix: F-17487r370848_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SOL-11.1-010150
- Vuln IDs
- V-216254
- Rule IDs
- SV-216254r958414_rule
Fix: F-17488r370851_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SOL-11.1-010160
- Vuln IDs
- V-216255
- Rule IDs
- SV-216255r958416_rule
Fix: F-17489r370854_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SOL-11.1-010170
- Vuln IDs
- V-216256
- Rule IDs
- SV-216256r958418_rule
Fix: F-17490r370857_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SOL-11.1-010180
- Vuln IDs
- V-216257
- Rule IDs
- SV-216257r958420_rule
Fix: F-17491r370860_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000139
- Version
- SOL-11.1-010390
- Vuln IDs
- V-216273
- Rule IDs
- SV-216273r958424_rule
Fix: F-17507r370908_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020300
- Vuln IDs
- V-216299
- Rule IDs
- SV-216299r959010_rule
Fix: F-17533r370986_fix
Ensure all system startup files have mode 0755 or less permissive. Examine the rc files, and all files in the rc1.d (rc2.d, and so on) directories, and in the /etc/init.d and /lib/svc/method directories to ensure they are not world writable. If they are world writable, use the chmod command to correct the vulnerability and to research why. Procedure: # chmod go-w <startupfile>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020320
- Vuln IDs
- V-216301
- Rule IDs
- SV-216301r959010_rule
Fix: F-17535r370992_fix
Edit the run control script and remove the relative path entries from the executable search path variable that have not been documented with the ISSO. Edit the run control script and remove any empty path entries from the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020360
- Vuln IDs
- V-216305
- Rule IDs
- SV-216305r959010_rule
Fix: F-17539r371004_fix
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020370
- Vuln IDs
- V-216306
- Rule IDs
- SV-216306r959010_rule
Fix: F-17540r371007_fix
Change the group ownership of the run control script(s) with incorrect group ownership. Procedure: # chgrp root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020510
- Vuln IDs
- V-216309
- Rule IDs
- SV-216309r959010_rule
Fix: F-17543r371016_fix
Change the mode of the .Xauthority files. Procedure: # chmod 0600 .Xauthority
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040040
- Vuln IDs
- V-216324
- Rule IDs
- SV-216324r986398_rule
Fix: F-17558r986397_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: PASSLENGTH Change the line to read: PASSLENGTH=15
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040060
- Vuln IDs
- V-216326
- Rule IDs
- SV-216326r986399_rule
Fix: F-17560r371067_fix
The root role is required. # pfedit /etc/default/passwd Search for MINDIFF. Change the line to read: MINDIFF=8
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040070
- Vuln IDs
- V-216327
- Rule IDs
- SV-216327r986400_rule
Fix: F-17561r371070_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINUPPER Change the line to read: MINUPPER=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040080
- Vuln IDs
- V-216328
- Rule IDs
- SV-216328r986401_rule
Fix: F-17562r371073_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINLOWER Change the line to read: MINLOWER=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040090
- Vuln IDs
- V-216329
- Rule IDs
- SV-216329r986402_rule
Fix: F-17563r371076_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINDIGIT Change the line to read: MINDIGIT=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040100
- Vuln IDs
- V-216330
- Rule IDs
- SV-216330r986403_rule
Fix: F-17564r371079_fix
The root role is required. # pfedit /etc/default/passwd a Locate the line containing: MINSPECIAL Change the line to read: MINSPECIAL=1
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040110
- Vuln IDs
- V-216331
- Rule IDs
- SV-216331r959010_rule
Fix: F-17565r371082_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MAXREPEATS Change the line to read: MAXREPEATS=3
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040120
- Vuln IDs
- V-216332
- Rule IDs
- SV-216332r959010_rule
Fix: F-17566r371085_fix
The root role is required. Remove, lock, or configure a password for any account with a blank password. # passwd [username] or Use the passwd -l command to lock accounts that are not permitted to execute commands. or Use the passwd -N command to set accounts to be non-login.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SOL-11.1-040130
- Vuln IDs
- V-216333
- Rule IDs
- SV-216333r986406_rule
Fix: F-17567r986405_fix
The root role is required. Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash. # pfedit /etc/security/policy.conf Check that the following lines exist and are not commented out: CRYPT_DEFAULT=6 CRYPT_ALGORITHMS_ALLOW=5,6
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SOL-11.1-040140
- Vuln IDs
- V-216334
- Rule IDs
- SV-216334r958388_rule
Fix: F-17568r371091_fix
The root role is required. # pfedit /etc/default/login Change the line: #RETRIES=5 to read RETRIES=3 pfedit /etc/security/policy.conf Change the line containing #LOCK_AFTER_RETRIES to read: LOCK_AFTER_RETRIES=YES If a user has lock_after_retries set to "no", update the user's attributes using the command: # usermod -K lock_after_retries=yes [username]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040160
- Vuln IDs
- V-216335
- Rule IDs
- SV-216335r959010_rule
Fix: F-17569r371094_fix
The root role is required. # pfedit the /etc/default/login Locate the line containing: SLEEPTIME Change the line to read: SLEEPTIME=4
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SOL-11.1-040170
- Vuln IDs
- V-216336
- Rule IDs
- SV-216336r958400_rule
Fix: F-17570r371097_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout: 0:00:05 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout: 0:00:05 lock: True
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SOL-11.1-040180
- Vuln IDs
- V-216337
- Rule IDs
- SV-216337r958402_rule
Fix: F-17571r371100_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout:0:00:05 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout:0:00:05 lock: True
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040190
- Vuln IDs
- V-216338
- Rule IDs
- SV-216338r959010_rule
Fix: F-17572r371103_fix
The root role is required. # pfedit /etc/default/passwd Insert the lines: DICTIONLIST=/usr/share/lib/dict/words DICTIONDBDIR=/var/passwd Generate the password dictionary by running the mkpwdict command. # mkpwdict -s /usr/share/lib/dict/words
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SOL-11.1-040230
- Vuln IDs
- V-216340
- Rule IDs
- SV-216340r986407_rule
Fix: F-17574r371109_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040250
- Vuln IDs
- V-216341
- Rule IDs
- SV-216341r959010_rule
Fix: F-17575r371112_fix
The root role is required. Edit local and global initialization files containing "umask" and change them to use 077. # pfedit /etc/default/login Insert the line UMASK=077 # pfedit [user initialization file] Insert the line umask 077
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040260
- Vuln IDs
- V-216342
- Rule IDs
- SV-216342r959010_rule
Fix: F-17576r371115_fix
The root role is required. # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. Otherwise, edit the FTP configuration file. # pfedit /etc/proftpd.conf Locate the line containing: Umask Change the line to read: Umask 077
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040310
- Vuln IDs
- V-216347
- Rule IDs
- SV-216347r959010_rule
Fix: F-17581r371130_fix
The Service Operator profile is required. Disable serial terminal services. # pfexec svcadm disable svc:/system/console-login:terma # pfexec svcadm disable svc:/system/console-login:termb
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040320
- Vuln IDs
- V-216350
- Rule IDs
- SV-216350r959010_rule
Fix: F-17584r462488_fix
Determine if the rpc-authdes package is installed: # pkg list solaris/legacy/security/rpc-authdes If the output of this command is: pkg list: no packages matching 'solaris/legacy/security/rpc-authdes' installed no further action is required. The root role is required. Modify the /etc/default/keyserv file. # pfedit /etc/default/keyserv Locate the line: #ENABLE_NOBODY_KEYS=YES Change it to: ENABLE_NOBODY_KEYS=NO
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040330
- Vuln IDs
- V-216351
- Rule IDs
- SV-216351r959010_rule
Fix: F-17585r371142_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the line containing: X11Forwarding Change it to: X11Forwarding no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040340
- Vuln IDs
- V-216352
- Rule IDs
- SV-216352r959010_rule
Fix: F-17586r462491_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the line containing: MaxAuthTries Change it to: MaxAuthTries 6 Restart the SSH service. # svcadm restart svc:/network/ssh Note: Solaris SSH MaxAuthTries of 6 maps to 3 actual failed attempts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040350
- Vuln IDs
- V-216353
- Rule IDs
- SV-216353r959010_rule
Fix: F-17587r371148_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: IgnoreRhosts Change it to: IgnoreRhosts yes Restart the SSH service. # svcadm restart svc:/network/ssh This action will only set the IgnoreRhosts line if it already exists in the file to ensure that it is set to the proper value. If the IgnoreRhosts line does not exist in the file, the default setting of "Yes" is automatically used, so no additional changes are needed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040360
- Vuln IDs
- V-216354
- Rule IDs
- SV-216354r959010_rule
Fix: F-17588r371151_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitRootLogin Change it to: PermitRootLogin no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040370
- Vuln IDs
- V-216355
- Rule IDs
- SV-216355r959010_rule
Fix: F-17589r371154_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitEmptyPasswords Change it to: PermitEmptyPasswords no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- SOL-11.1-040380
- Vuln IDs
- V-216356
- Rule IDs
- SV-216356r970703_rule
Fix: F-17590r371157_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. Modify the sshd_config file: # pfedit /etc/ssh/sshd_config Modify or add the lines containing: ClientAliveInterval ClientAliveCountMax Change them to: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service: # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040390
- Vuln IDs
- V-216357
- Rule IDs
- SV-216357r959010_rule
Fix: F-17591r371160_fix
Note: This is the location for Solaris 11.1. For earlier versions, the information is in /etc/pam.conf. The root role is required. # ls -l /etc/pam.d to identify the various configuration files used by PAM. Search each file for the pam_rhosts_auth.so.1 entry. # grep pam_rhosts_auth.so.1 [filename] Identify the file with the line pam_hosts_auth.so.1 in it. # pfedit [filename] Insert a comment character (#) at the beginning of the line containing "pam_hosts_auth.so.1".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040400
- Vuln IDs
- V-216358
- Rule IDs
- SV-216358r959010_rule
Fix: F-17592r371163_fix
The root role is required. Determine if the FTP server package is installed: # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. # for user in `logins -s | awk '{ print $1 }'` \ aiuser noaccess nobody nobody4; do $(echo $user >> /etc/ftpd/ftpusers) done # sort -u /etc/ftpd/ftpusers > /etc/ftpd/ftpusers.temp # mv /etc/ftpd/ftpusers.temp /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040410
- Vuln IDs
- V-216359
- Rule IDs
- SV-216359r959010_rule
Fix: F-17593r371166_fix
The root role is required. Modify the /etc/pam.d/gdm-autologin file. # pfedit /etc/pam.d/gdm-autologin Locate the lines: auth required pam_unix_cred.so.1 auth sufficient pam_allow.so.1 account sufficient pam_allow.so.1 Change the lines to read: #auth required pam_unix_cred.so.1 #auth sufficient pam_allow.so.1 #account sufficient pam_allow.so.1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040430
- Vuln IDs
- V-216361
- Rule IDs
- SV-216361r959010_rule
Fix: F-17595r371172_fix
The root role is required. Modify the /etc/default/login file # pfedit /etc/default/login Locate the line containing: CONSOLE Change it to read: CONSOLE=/dev/console
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- SOL-11.1-040450
- Vuln IDs
- V-216362
- Rule IDs
- SV-216362r987814_rule
Fix: F-17596r371175_fix
The root role is required for this action. # pfedit /etc/ssh/sshd_config Locate the line containing: PrintLastLog no and place a comment sign ("# ")at the beginning of the line or delete the line # PrintLastLog no Restart the ssh service # pfexec svcadm restart svc:/network/ssh
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SOL-11.1-040470
- Vuln IDs
- V-216364
- Rule IDs
- SV-216364r958404_rule
Fix: F-17598r371181_fix
For Solaris 11, 11.1, 11.2, and 11.3: In the GNOME 2 desktop: System >> Preferences >> Screensaver. For Solaris 11.4 or newer: If using the default GNOME desktop: Activities >> Show Applications >> select “Screensaver” icon. If using the GNOME Classic desktop: Applications >> Other >> Screensaver. Click on Mode's pull-down. Select: "Blank Screen Only". Ensure that "Blank Screen Only" is selected.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040480
- Vuln IDs
- V-216365
- Rule IDs
- SV-216365r959010_rule
Fix: F-17599r371184_fix
The root role is required. Modify the /etc/default/login file. # pfedit /etc/default/login Insert the line: PASSREQ=YES
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SOL-11.1-050460
- Vuln IDs
- V-216399
- Rule IDs
- SV-216399r986416_rule
Fix: F-17633r371286_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. # pfedit /etc/ssh/sshd_config Insert the two lines: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service with the new configuration. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070020
- Vuln IDs
- V-216418
- Rule IDs
- SV-216418r959010_rule
Fix: F-17652r371343_fix
The root role is required. Change the permissions on users' directories to 750 or less permissive. # chmod 750 [directory name]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070040
- Vuln IDs
- V-216420
- Rule IDs
- SV-216420r959010_rule
Fix: F-17654r371349_fix
The root role is required. Change the permissions on users' .netrc files to 750 or less permissive. # chmod 750 [file name]
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-070050
- Vuln IDs
- V-216421
- Rule IDs
- SV-216421r959010_rule
Fix: F-17655r371352_fix
The root role is required. Remove any .rhosts files found. # rm [file name]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070060
- Vuln IDs
- V-216422
- Rule IDs
- SV-216422r959010_rule
Fix: F-17656r371355_fix
The root role is required. Correct or justify any items discovered in the Audit step. Determine if any groups are in passwd but not in group, and work with those users or group owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-070070
- Vuln IDs
- V-216423
- Rule IDs
- SV-216423r959010_rule
Fix: F-17657r371358_fix
The root role is required. Correct or justify any items discovered in the check step. Determine if there exists any users who are in passwd but do not have a home directory, and work with those users to determine the best course of action in accordance with site policy. This generally means deleting the user or creating a valid home directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070130
- Vuln IDs
- V-216429
- Rule IDs
- SV-216429r959010_rule
Fix: F-17663r462494_fix
The root role is required. Correct or justify any items discovered in the Check step. Determine if there are any accounts using these reserved UIDs, and work with their owners to determine the best course of action in accordance with site policy. This may require deleting users or changing UIDs for users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070160
- Vuln IDs
- V-216432
- Rule IDs
- SV-216432r959010_rule
Fix: F-17666r371385_fix
The root role is required. Determine if any .netrc files exist, and work with the owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070170
- Vuln IDs
- V-216433
- Rule IDs
- SV-216433r959010_rule
Fix: F-17667r371388_fix
The root role is required. Remove any .forward files that are found. # pfexec rm [filename]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070220
- Vuln IDs
- V-216438
- Rule IDs
- SV-216438r959010_rule
Fix: F-17672r371403_fix
The root role is required. Change the default GID of non-root accounts to a valid GID other than 0.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001314
- Version
- SOL-11.1-070240
- Vuln IDs
- V-216439
- Rule IDs
- SV-216439r958566_rule
Fix: F-17673r371406_fix
The root role is required. Change the permissions and owner on the /var/adm/messages file: # chmod 640 /var/adm/messages # chown root /var/adm/messages # chgrp root /var/adm/messages Change the permissions and owner on the /var/adm directory: # chmod 750 /var/adm # chown root /var/adm # chgrp sys /var/adm
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-080010
- Vuln IDs
- V-216442
- Rule IDs
- SV-216442r959010_rule
Fix: F-17676r371415_fix
Upgrade to a supported version of the operating system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-080150
- Vuln IDs
- V-216455
- Rule IDs
- SV-216455r959010_rule
Fix: F-17689r371454_fix
The root role is required. Solaris 11 ZFS copy-on-write model allows filesystem accesses to work according to a transactional model, such that on-disk content is always consistent and cannot be configured to be out of compliance. If any UFS file systems are mounted with the "nologging" options, remove that option from the /etc/vfstab file. # pfedit /etc/vfstab Locate any file systems listed with the "nologging" option and delete the keyword "nologging".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-100020
- Vuln IDs
- V-216475
- Rule IDs
- SV-216475r959010_rule
Fix: F-17709r371508_fix
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The Zone Security profile is required: Change the "limitpriv" setting to default. # pfexec zonecfg -z [zone] set limitpriv=default
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-120410
- Vuln IDs
- V-216479
- Rule IDs
- SV-216479r959010_rule
Fix: F-17713r371520_fix
The root role is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global" this check applies. Modify the /etc/system file. Determine the OS version you are currently securing. # uname –v For Solaris 11GA and 11.1 # pfedit /etc/system Add a line containing: exclude: scsa2usb Note that the global zone will need to be rebooted for this change to take effect. For Solaris 11.2 or newer Modify an /etc/system.d file. # pfedit /etc/system.d/USB:MassStorage Add a line containing: exclude: scsa2usb Note that the global zone will need to be rebooted for this change to take effect.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SOL-11.1-010060
- Vuln IDs
- V-219959
- Rule IDs
- SV-219959r958768_rule
Fix: F-21668r370830_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SOL-11.1-010070
- Vuln IDs
- V-219960
- Rule IDs
- SV-219960r958774_rule
Fix: F-21669r370833_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SOL-11.1-010100
- Vuln IDs
- V-219961
- Rule IDs
- SV-219961r958442_rule
Fix: F-21670r370839_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SOL-11.1-010130
- Vuln IDs
- V-219962
- Rule IDs
- SV-219962r958442_rule
Fix: F-21671r370845_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SOL-11.1-010370
- Vuln IDs
- V-219965
- Rule IDs
- SV-219965r971542_rule
Fix: F-21674r370902_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-001858
- Version
- SOL-11.1-010380
- Vuln IDs
- V-219966
- Rule IDs
- SV-219966r958758_rule
Fix: F-21675r370905_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SOL-11.1-030060
- Vuln IDs
- V-219972
- Rule IDs
- SV-219972r958548_rule
Fix: F-21681r371049_fix
The Service Management profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Disable the rmvolmgr service. # pfexec svcadm disable svc:/system/filesystem/rmvolmgr:default
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SOL-11.1-040200
- Vuln IDs
- V-219973
- Rule IDs
- SV-219973r958726_rule
Fix: F-21682r371106_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]