UCF STIG Viewer Logo

The audit system must be configured to audit file deletions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-47805 SOL-11.1-010220 SV-60681r1_rule Medium
Description
Without auditing, malicious activity cannot be detected.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2017-03-02

Details

Check Text ( C-50261r1_chk )
The Audit Configuration profile is required.

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

Check that the flag for file deletions is enabled.

# pfexec auditconfig -getflags | grep active |sed s/'active user default audit flags ='// | grep fd
# pfexec auditconfig -getnaflags | grep active |sed s/'active user default audit flags ='// | grep fd

If audit flags are not displayed, this is a finding.

Determine if auditing policy is set to collect command line arguments.

# pfexec auditconfig -getpolicy | grep active | grep argv

If the active audit policies line does not appear, this is a finding.
Fix Text (F-51425r1_fix)
The Audit Configuration profile is required. All audit flags must be enabled in a single command.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this action applies.

# pfexec auditconfig -setflags cusa,ps,fd,-fa,fm
# pfexec auditconfig -setnaflags cusa,ps,fd,-fa,fm

Enable the audit policy to collect command line arguments.

# pfexec auditconfig -setpolicy +argv

These changes will not affect users that are currently logged in.