UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

A file integrity baseline must be created and maintained.


Overview

Finding ID Version Rule ID IA Controls Severity
V-11941 GEN000140 SV-12442r2_rule DCSW-1 Medium
Description
A file integrity baseline is a collection of file metadata which is to evaluate the integrity of the system. A minimal baseline must contain metadata for all device files, setuid files, setgid files, system libraries, system binaries, and system configuration files. The minimal metadata must consist of the mode, owner, group owner, and modification times. For regular files, metadata must also include file size and a cryptographic hash of the file’s contents.
STIG Date
Solaris 9 X86 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-7918r2_chk )
Determine if a file integrity baseline, which includes cryptographic hashes, has been created and maintained for the system. If no file integrity baseline exists for the system, this is a finding. If the file integrity baseline contains no cryptographic hashes, this is a finding. If the file integrity baseline is not maintained (has not been updated to be consistent with the latest approved system configuration changes), this is a finding.
Fix Text (F-11212r2_fix)
Create a file integrity baseline, including cryptographic hashes, for the system.