Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-219984 | SOL-11.1-060190 | SV-219984r603267_rule | Medium |
Description |
---|
Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks. |
STIG | Date |
---|---|
Solaris 11 SPARC Security Technical Implementation Guide | 2020-12-08 |
Check Text ( C-21694r371336_chk ) |
---|
The operator shall determine if IPsec is being used to encrypt data for activities such as cluster interconnects or other non-SSH, SFTP data connections. On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation. Check that the IPsec policy service is online: # svcs svc:/network/ipsec/policy:default If the IPsec service is not online, this is a finding. If encrypted protocols are not used between systems, this is a finding. |
Fix Text (F-21693r371337_fix) |
---|
The Service Management profile is required. Configure IPsec encrypted tunneling between two systems. On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation. Ensure that the IPsec policy service is online: Enable the IPsec service: # svcadm enable svc:/network/ipsec/policy:default |