Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-216241 | SOL-11.1-100040 | SV-216241r603268_rule | Low |
Description |
---|
Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event. |
STIG | Date |
---|---|
Solaris 11 x86 Security Technical Implementation Guide | 2024-02-02 |
Check Text ( C-17479r373099_chk ) |
---|
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. List the non-global zones on the system. # zoneadm list -vi | grep -v global The Audit Configuration profile is required. Determine whether the "zonename" auditing policy is in effect. # pfexec auditconfig -getpolicy | grep active | grep zonename If no output is returned, this is a finding. |
Fix Text (F-17477r373100_fix) |
---|
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. List the non-global zones on the system. # zoneadm list -vi | grep -v global The Audit Configuration profile is required. Enable the "zonename" auditing policy. # pfexec auditconfig -setpolicy +zonename |