Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-47817 | SOL-11.1-010300 | SV-60693r1_rule | Medium |
Description |
---|
Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account. |
STIG | Date |
---|---|
Solaris 11 SPARC Security Technical Implementation Guide | 2017-01-05 |
Check Text ( C-50273r1_chk ) |
---|
The Audit Configuration profile is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. # pfexec auditconfig -getflags | grep active |sed s/'active user default audit flags ='// | grep as # pfexec auditconfig -getnaflags | grep active |sed s/'active user default audit flags ='// | grep as If audit flags are not displayed, this is a finding. Determine if auditing policy is set to collect command line arguments. # pfexec auditconfig -getpolicy | grep active | grep argv If the active audit policies line does not appear, this is a finding. |
Fix Text (F-51437r1_fix) |
---|
The Audit Configuration profile is required. All audit flags must be enabled in a single command. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. # pfexec auditconfig -setflags cusa,ps,fd,-fa,fm # pfexec auditconfig -setnaflags cusa,ps,fd,-fa,fm Enable the audit policy to collect command line arguments. # pfexec auditconfig -setpolicy +argv These changes will not affect users that are currently logged in. |