Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22509 | GEN006575 | SV-26861r1_rule | ECSC-1 | Low |
Description |
---|
File integrity tools often use cryptographic hashes for verifying that file contents have not been altered. These hashes must be FIPS 140-2 approved. |
STIG | Date |
---|---|
Solaris 9 X86 Security Technical Implementation Guide | 2013-07-02 |
Check Text ( C-27831r2_chk ) |
---|
If using AIDE, verify the configuration contains the sha256 or sha512 options for all monitored files and directories. Here is an example AIDE configuration fragment. SampleRule = p+i+l+n+u+g+s+m+c+acl+xattrs+sha256 /bin SampleRule If either the sha256 or sha512 option is not present, this is a finding. If using a different file integrity tool, check the configuration per tool documentation. |
Fix Text (F-24103r2_fix) |
---|
If using AIDE, edit the configuration and add the sha256 or sha512 option for all monitored files and directories. If using a different file integrity tool, configure FIPS 140-2 approved cryptographic hashes per the tool's documentation. |