Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-47863 | SOL-11.1-010420 | SV-60737r2_rule | Medium |
Description |
---|
Continuing to operate a system without auditing working properly can result in undocumented access or system changes. |
STIG | Date |
---|---|
Solaris 11 SPARC Security Technical Implementation Guide | 2020-05-21 |
Check Text ( C-50309r2_chk ) |
---|
The Audit Configuration profile is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. # pfexec auditconfig -getpolicy | grep ahlt If the output does not include "ahlt" as an active audit policy, this is a finding. # pfexec auditconfig -getpolicy | grep active | grep cnt If the output includes "cnt" as an active audit policy, this is a finding. |
Fix Text (F-51481r3_fix) |
---|
The Audit Configuration profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Set audit policy to halt and suspend on failure. # pfexec auditconfig -setpolicy +ahlt # pfexec auditconfig -setpolicy -cnt |