Solaris 11 X86 STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SOL-11.1-010040
- Vuln IDs
- V-216011
- Rule IDs
- SV-216011r986460_rule
Fix: F-17247r986459_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone to be secured. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SOL-11.1-010080
- Vuln IDs
- V-216014
- Rule IDs
- SV-216014r958430_rule
Fix: F-17250r372425_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SOL-11.1-010100
- Vuln IDs
- V-216015
- Rule IDs
- SV-216015r958442_rule
Fix: F-17251r372428_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SOL-11.1-010120
- Vuln IDs
- V-216016
- Rule IDs
- SV-216016r958446_rule
Fix: F-17252r372431_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SOL-11.1-010140
- Vuln IDs
- V-216018
- Rule IDs
- SV-216018r958412_rule
Fix: F-17254r372437_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SOL-11.1-010150
- Vuln IDs
- V-216019
- Rule IDs
- SV-216019r958414_rule
Fix: F-17255r372440_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SOL-11.1-010160
- Vuln IDs
- V-216020
- Rule IDs
- SV-216020r958416_rule
Fix: F-17256r372443_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SOL-11.1-010170
- Vuln IDs
- V-216021
- Rule IDs
- SV-216021r958418_rule
Fix: F-17257r372446_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SOL-11.1-010180
- Vuln IDs
- V-216022
- Rule IDs
- SV-216022r958420_rule
Fix: F-17258r372449_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000139
- Version
- SOL-11.1-010390
- Vuln IDs
- V-216038
- Rule IDs
- SV-216038r958424_rule
Fix: F-17274r372497_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020300
- Vuln IDs
- V-216064
- Rule IDs
- SV-216064r959010_rule
Fix: F-17300r372575_fix
Ensure all system startup files have mode 0755 or less permissive. Examine the rc files, and all files in the rc1.d (rc2.d, and so on) directories, and in the /etc/init.d and /lib/svc/method directories to ensure they are not world writable. If they are world writable, use the chmod command to correct the vulnerability and to research why. Procedure: # chmod go-w <startupfile>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020320
- Vuln IDs
- V-216066
- Rule IDs
- SV-216066r959010_rule
Fix: F-17302r372581_fix
Edit the run control script and remove the relative path entries from the executable search path variable that have not been documented with the ISSO. Edit the run control script and remove any empty path entries from the file.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020360
- Vuln IDs
- V-216070
- Rule IDs
- SV-216070r959010_rule
Fix: F-17306r372593_fix
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020370
- Vuln IDs
- V-216071
- Rule IDs
- SV-216071r959010_rule
Fix: F-17307r372596_fix
Change the group ownership of the run control script(s) with incorrect group ownership. Procedure: # chgrp root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-020510
- Vuln IDs
- V-216074
- Rule IDs
- SV-216074r959010_rule
Fix: F-17310r372605_fix
Change the mode of the .Xauthority files. Procedure: # chmod 0600 .Xauthority
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040040
- Vuln IDs
- V-216089
- Rule IDs
- SV-216089r1016285_rule
Fix: F-17325r986428_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: PASSLENGTH Change the line to read: PASSLENGTH=15
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040060
- Vuln IDs
- V-216091
- Rule IDs
- SV-216091r1016286_rule
Fix: F-17327r372656_fix
The root role is required. # pfedit /etc/default/passwd Search for MINDIFF. Change the line to read: MINDIFF=8
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040070
- Vuln IDs
- V-216092
- Rule IDs
- SV-216092r1016287_rule
Fix: F-17328r986433_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINUPPER Change the line to read: MINUPPER=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040080
- Vuln IDs
- V-216093
- Rule IDs
- SV-216093r1016288_rule
Fix: F-17329r986436_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINLOWER Change the line to read: MINLOWER=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040090
- Vuln IDs
- V-216094
- Rule IDs
- SV-216094r1016289_rule
Fix: F-17330r986439_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MINDIGIT Change the line to read: MINDIGIT=1
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SOL-11.1-040100
- Vuln IDs
- V-216095
- Rule IDs
- SV-216095r1016290_rule
Fix: F-17331r986442_fix
The root role is required. # pfedit /etc/default/passwd a Locate the line containing: MINSPECIAL Change the line to read: MINSPECIAL=1
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040110
- Vuln IDs
- V-216096
- Rule IDs
- SV-216096r959010_rule
Fix: F-17332r372671_fix
The root role is required. # pfedit /etc/default/passwd Locate the line containing: MAXREPEATS Change the line to read: MAXREPEATS=3
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040120
- Vuln IDs
- V-216097
- Rule IDs
- SV-216097r959010_rule
Fix: F-17333r372674_fix
The root role is required. Remove, lock, or configure a password for any account with a blank password. # passwd [username] or Use the passwd -l command to lock accounts that are not permitted to execute commands. or Use the passwd -N command to set accounts to be non-login.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SOL-11.1-040130
- Vuln IDs
- V-216098
- Rule IDs
- SV-216098r1016291_rule
Fix: F-17334r986445_fix
The root role is required. Configure the system to disallow the use of UNIX encryption and enable SHA256 as the default encryption hash. # pfedit /etc/security/policy.conf Check that the following lines exist and are not commented out: CRYPT_DEFAULT=6 CRYPT_ALGORITHMS_ALLOW=5,6
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SOL-11.1-040140
- Vuln IDs
- V-216099
- Rule IDs
- SV-216099r958388_rule
Fix: F-17335r372680_fix
The root role is required. # pfedit /etc/default/login Change the line: #RETRIES=5 to read RETRIES=3 pfedit /etc/security/policy.conf Change the line containing #LOCK_AFTER_RETRIES to read: LOCK_AFTER_RETRIES=YES If a user has lock_after_retries set to "no", update the user's attributes using the command: # usermod -K lock_after_retries=yes [username]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040160
- Vuln IDs
- V-216100
- Rule IDs
- SV-216100r959010_rule
Fix: F-17336r372683_fix
The root role is required. # pfedit the /etc/default/login Locate the line containing: SLEEPTIME Change the line to read: SLEEPTIME=4
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SOL-11.1-040170
- Vuln IDs
- V-216101
- Rule IDs
- SV-216101r958400_rule
Fix: F-17337r372686_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout: 0:00:05 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout: 0:00:05 lock: True
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SOL-11.1-040180
- Vuln IDs
- V-216102
- Rule IDs
- SV-216102r958402_rule
Fix: F-17338r372689_fix
The root role is required. Edit the global screensaver configuration file to ensure 15 minute screen lock. # pfedit /usr/share/X11/app-defaults/XScreenSaver Find the timeout control lines and change them to read: *timeout: 0:15:00 *lockTimeout:0:00:05 *lock: True For each user on the system, edit their local $HOME/.xscreensaver file and change the timeout values. # pfedit $HOME/.xscreensaver Find the timeout control lines and change them to read: timeout: 0:15:00 lockTimeout:0:00:05 lock: True
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040190
- Vuln IDs
- V-216103
- Rule IDs
- SV-216103r959010_rule
Fix: F-17339r372692_fix
The root role is required. # pfedit /etc/default/passwd Insert the lines: DICTIONLIST=/usr/share/lib/dict/words DICTIONDBDIR=/var/passwd Generate the password dictionary by running the mkpwdict command. # mkpwdict -s /usr/share/lib/dict/words
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SOL-11.1-040230
- Vuln IDs
- V-216105
- Rule IDs
- SV-216105r1016292_rule
Fix: F-17341r372698_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040250
- Vuln IDs
- V-216106
- Rule IDs
- SV-216106r959010_rule
Fix: F-17342r372701_fix
The root role is required. Edit local and global initialization files containing "umask" and change them to use 077. # pfedit /etc/default/login Insert the line UMASK=077 # pfedit [user initialization file] Insert the line umask 077
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040260
- Vuln IDs
- V-216107
- Rule IDs
- SV-216107r959010_rule
Fix: F-17343r372704_fix
The root role is required. # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. Otherwise, edit the FTP configuration file. # pfedit /etc/proftpd.conf Locate the line containing: Umask Change the line to read: Umask 077
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040310
- Vuln IDs
- V-216112
- Rule IDs
- SV-216112r959010_rule
Fix: F-17348r372719_fix
The Service Operator profile is required. Disable serial terminal services. # pfexec svcadm disable svc:/system/console-login:terma # pfexec svcadm disable svc:/system/console-login:termb
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040320
- Vuln IDs
- V-216113
- Rule IDs
- SV-216113r959010_rule
Fix: F-17349r462443_fix
Determine if the rpc-authdes package is installed: # pkg list solaris/legacy/security/rpc-authdes If the output of this command is: pkg list: no packages matching 'solaris/legacy/security/rpc-authdes' installed no further action is required. The root role is required. Modify the /etc/default/keyserv file. # pfedit /etc/default/keyserv Locate the line: #ENABLE_NOBODY_KEYS=YES Change it to: ENABLE_NOBODY_KEYS=NO
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040330
- Vuln IDs
- V-216114
- Rule IDs
- SV-216114r959010_rule
Fix: F-17350r372725_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the line containing: X11Forwarding Change it to: X11Forwarding no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-040340
- Vuln IDs
- V-216115
- Rule IDs
- SV-216115r1155803_rule
Fix: F-17351r1155802_fix
The root role is required. Modify the sshd_config file. # pfedit /etc/ssh/sshd_config Locate the lines containing: MaxAuthTries MaxAuthTriesLog Change them to: MaxAuthTries 6 MaxAuthTriesLog 6 Restart the SSH service. # svcadm restart svc:/network/ssh Note: Solaris SSH MaxAuthTries of 6 maps to 3 actual failed attempts.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040350
- Vuln IDs
- V-216116
- Rule IDs
- SV-216116r959010_rule
Fix: F-17352r372731_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: IgnoreRhosts Change it to: IgnoreRhosts yes Restart the SSH service. # svcadm restart svc:/network/ssh This action will only set the IgnoreRhosts line if it already exists in the file to ensure that it is set to the proper value. If the IgnoreRhosts line does not exist in the file, the default setting of "Yes" is automatically used, so no additional changes are needed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040360
- Vuln IDs
- V-216117
- Rule IDs
- SV-216117r959010_rule
Fix: F-17353r372734_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitRootLogin Change it to: PermitRootLogin no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040370
- Vuln IDs
- V-216118
- Rule IDs
- SV-216118r959010_rule
Fix: F-17354r372737_fix
The root role is required. Modify the sshd_config file # pfedit /etc/ssh/sshd_config Locate the line containing: PermitEmptyPasswords Change it to: PermitEmptyPasswords no Restart the SSH service. # svcadm restart svc:/network/ssh
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- SOL-11.1-040380
- Vuln IDs
- V-216119
- Rule IDs
- SV-216119r970703_rule
Fix: F-17355r372740_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. Modify the sshd_config file: # pfedit /etc/ssh/sshd_config Modify or add the lines containing: ClientAliveInterval ClientAliveCountMax Change them to: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service: # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040390
- Vuln IDs
- V-216120
- Rule IDs
- SV-216120r959010_rule
Fix: F-17356r372743_fix
Note: This is the location for Solaris 11.1. For earlier versions, the information is in /etc/pam.conf. The root role is required. # ls -l /etc/pam.d to identify the various configuration files used by PAM. Search each file for the pam_rhosts_auth.so.1 entry. # grep pam_rhosts_auth.so.1 [filename] Identify the file with the line pam_hosts_auth.so.1 in it. # pfedit [filename] Insert a comment character (#) at the beginning of the line containing "pam_hosts_auth.so.1".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040400
- Vuln IDs
- V-216121
- Rule IDs
- SV-216121r959010_rule
Fix: F-17357r372746_fix
The root role is required. Determine if the FTP server package is installed: # pkg list service/network/ftp If the output of this command is: pkg list: no packages matching 'service/network/ftp' installed no further action is required. # for user in `logins -s | awk '{ print $1 }'` \ aiuser noaccess nobody nobody4; do $(echo $user >> /etc/ftpd/ftpusers) done # sort -u /etc/ftpd/ftpusers > /etc/ftpd/ftpusers.temp # mv /etc/ftpd/ftpusers.temp /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040410
- Vuln IDs
- V-216122
- Rule IDs
- SV-216122r959010_rule
Fix: F-17358r372749_fix
The root role is required. Modify the /etc/pam.d/gdm-autologin file. # pfedit /etc/pam.d/gdm-autologin Locate the lines: auth required pam_unix_cred.so.1 auth sufficient pam_allow.so.1 account sufficient pam_allow.so.1 Change the lines to read: #auth required pam_unix_cred.so.1 #auth sufficient pam_allow.so.1 #account sufficient pam_allow.so.1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-040430
- Vuln IDs
- V-216124
- Rule IDs
- SV-216124r959010_rule
Fix: F-17360r372755_fix
The root role is required. Modify the /etc/default/login file # pfedit /etc/default/login Locate the line containing: CONSOLE Change it to read: CONSOLE=/dev/console
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000052
- Version
- SOL-11.1-040450
- Vuln IDs
- V-216125
- Rule IDs
- SV-216125r987814_rule
Fix: F-17361r372758_fix
The root role is required for this action. # pfedit /etc/ssh/sshd_config Locate the line containing: PrintLastLog no and place a comment sign ("# ")at the beginning of the line or delete the line # PrintLastLog no Restart the ssh service # pfexec svcadm restart svc:/network/ssh
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SOL-11.1-040470
- Vuln IDs
- V-216127
- Rule IDs
- SV-216127r958404_rule
Fix: F-17363r372764_fix
For Solaris 11, 11.1, 11.2, and 11.3: In the GNOME 2 desktop: System >> Preferences >> Screensaver. For Solaris 11.4 or newer: If using the default GNOME desktop: Activities >> Show Applications >> select "Screensaver" icon. If using the GNOME Classic desktop: Applications >> Other >> Screensaver. Click on Mode's pull-down. Select: "Blank Screen Only". Ensure that "Blank Screen Only" is selected.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-040480
- Vuln IDs
- V-216128
- Rule IDs
- SV-216128r959010_rule
Fix: F-17364r372767_fix
The root role is required. Modify the /etc/default/login file. # pfedit /etc/default/login Insert the line: PASSREQ=YES
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SOL-11.1-050460
- Vuln IDs
- V-216162
- Rule IDs
- SV-216162r986457_rule
Fix: F-17398r372869_fix
The root role is required. Configure the system to disconnect SSH sessions after 10 minutes of inactivity. # pfedit /etc/ssh/sshd_config Insert the two lines: ClientAliveInterval 600 ClientAliveCountMax 0 Restart the SSH service with the new configuration. # svcadm restart svc:/network/ssh
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070020
- Vuln IDs
- V-216181
- Rule IDs
- SV-216181r959010_rule
Fix: F-17417r372926_fix
The root role is required. Change the permissions on users' directories to 750 or less permissive. # chmod 750 [directory name]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070040
- Vuln IDs
- V-216183
- Rule IDs
- SV-216183r959010_rule
Fix: F-17419r372932_fix
The root role is required. Change the permissions on users' .netrc files to 750 or less permissive. # chmod 750 [file name]
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-070050
- Vuln IDs
- V-216184
- Rule IDs
- SV-216184r959010_rule
Fix: F-17420r372935_fix
The root role is required. Remove any .rhosts files found. # rm [file name]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070060
- Vuln IDs
- V-216185
- Rule IDs
- SV-216185r959010_rule
Fix: F-17421r372938_fix
The root role is required. Correct or justify any items discovered in the Audit step. Determine if any groups are in passwd but not in group, and work with those users or group owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-070070
- Vuln IDs
- V-216186
- Rule IDs
- SV-216186r959010_rule
Fix: F-17422r372941_fix
The root role is required. Correct or justify any items discovered in the check step. Determine if there exists any users who are in passwd but do not have a home directory, and work with those users to determine the best course of action in accordance with site policy. This generally means deleting the user or creating a valid home directory.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070130
- Vuln IDs
- V-216192
- Rule IDs
- SV-216192r959010_rule
Fix: F-17428r462482_fix
The root role is required. Correct or justify any items discovered in the Check step. Determine if there are any accounts using these reserved UIDs, and work with their owners to determine the best course of action in accordance with site policy. This may require deleting users or changing UIDs for users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070160
- Vuln IDs
- V-216195
- Rule IDs
- SV-216195r959010_rule
Fix: F-17431r372968_fix
The root role is required. Determine if any .netrc files exist, and work with the owners to determine the best course of action in accordance with site policy.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070170
- Vuln IDs
- V-216196
- Rule IDs
- SV-216196r959010_rule
Fix: F-17432r372971_fix
The root role is required. Remove any .forward files that are found. # pfexec rm [filename]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-070220
- Vuln IDs
- V-216201
- Rule IDs
- SV-216201r959010_rule
Fix: F-17437r372986_fix
The root role is required. Change the default GID of non-root accounts to a valid GID other than 0.
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001314
- Version
- SOL-11.1-070240
- Vuln IDs
- V-216202
- Rule IDs
- SV-216202r958566_rule
Fix: F-17438r372989_fix
The root role is required. Change the permissions and owner on the /var/adm/messages file: # chmod 640 /var/adm/messages # chown root /var/adm/messages # chgrp root /var/adm/messages Change the permissions and owner on the /var/adm directory: # chmod 750 /var/adm # chown root /var/adm # chgrp sys /var/adm
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SOL-11.1-080010
- Vuln IDs
- V-216205
- Rule IDs
- SV-216205r1155804_rule
Fix: F-17441r372998_fix
Upgrade to a supported version of the operating system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-080140
- Vuln IDs
- V-216218
- Rule IDs
- SV-216218r959010_rule
Fix: F-17454r373037_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Update GRUB to use a custom configuration file. # pfedit /rpool/boot/grub/grub.cfg Insert the line: source $prefix/custom.cfg Create a password hash. # /usr/lib/grub2/bios/bin/grub-mkpasswd-pbkdf2 Enter password: Reenter password: Your PBKDF2 is ....... Copy the long password hash in its entirety. # pfedit /rpool/boot/grub/custom.cfg Insert the lines: set superusers="[username]" password_pbkdf2 [username] [password hash] Restart the system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-080150
- Vuln IDs
- V-216219
- Rule IDs
- SV-216219r959010_rule
Fix: F-17455r373040_fix
The root role is required. Solaris 11 ZFS copy-on-write model allows filesystem accesses to work according to a transactional model, such that on-disk content is always consistent and cannot be configured to be out of compliance. If any UFS file systems are mounted with the "nologging" options, remove that option from the /etc/vfstab file. # pfedit /etc/vfstab Locate any file systems listed with the "nologging" option and delete the keyword "nologging".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SOL-11.1-100020
- Vuln IDs
- V-216239
- Rule IDs
- SV-216239r959010_rule
Fix: F-17475r373094_fix
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The Zone Security profile is required: Change the "limitpriv" setting to default. # pfexec zonecfg -z [zone] set limitpriv=default
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SOL-11.1-120410
- Vuln IDs
- V-216243
- Rule IDs
- SV-216243r959010_rule
Fix: F-17479r373106_fix
The root role is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global" this check applies. Modify the /etc/system file. Determine the OS version you are currently securing. # uname -v For Solaris 11GA and 11.1 # pfedit /etc/system Add a line containing: exclude: scsa2usb Note that the global zone will need to be rebooted for this change to take effect. For Solaris 11.2 or newer Modify an /etc/system.d file. # pfedit /etc/system.d/USB:MassStorage Add a line containing: exclude: scsa2usb Note that the global zone will need to be rebooted for this change to take effect.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SOL-11.1-010060
- Vuln IDs
- V-219988
- Rule IDs
- SV-219988r958768_rule
Fix: F-21697r372419_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SOL-11.1-010070
- Vuln IDs
- V-219989
- Rule IDs
- SV-219989r958774_rule
Fix: F-21698r372422_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SOL-11.1-010130
- Vuln IDs
- V-219990
- Rule IDs
- SV-219990r958442_rule
Fix: F-21699r372434_fix
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SOL-11.1-010370
- Vuln IDs
- V-219993
- Rule IDs
- SV-219993r971542_rule
Fix: F-21702r372491_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-001858
- Version
- SOL-11.1-010380
- Vuln IDs
- V-219994
- Rule IDs
- SV-219994r958758_rule
Fix: F-21703r372494_fix
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- SOL-11.1-030060
- Vuln IDs
- V-220000
- Rule IDs
- SV-220000r958548_rule
Fix: F-21709r372638_fix
The Service Management profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Disable the rmvolmgr service. # pfexec svcadm disable svc:/system/filesystem/rmvolmgr:default
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SOL-11.1-040200
- Vuln IDs
- V-220001
- Rule IDs
- SV-220001r958726_rule
Fix: F-21710r372695_fix
The root role is required. Convert the root user into a role. # usermod -K type=role root Add the root role to authorized users' logins. # usermod -R +root [username] Remove the root role from users who should not be authorized to assume it. # usermod -R -root [username]