Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-216018 | SOL-11.1-010140 | SV-216018r505929_rule | Medium |
Description |
---|
Without proper system auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account. |
STIG | Date |
---|---|
Solaris 11 X86 Security Technical Implementation Guide | 2020-09-03 |
Check Text ( C-17256r372436_chk ) |
---|
The Audit Configuration profile is required. This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. Check the status of the audit system. It must be auditing. # pfexec auditconfig -getcond If this command does not report: audit condition = auditing this is a finding. |
Fix Text (F-17254r372437_fix) |
---|
The Audit Control profile is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. If auditing has been disabled, it must be enabled with the following command: # pfexec audit -s |