UCF STIG Viewer Logo

The file integrity tool must be configured to verify ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22507 GEN006570 SV-26858r1_rule ECAT-1 Low
Description
ACLs can provide permissions beyond those permitted through the file mode and must be verified by file integrity tools.
STIG Date
SOLARIS 9 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2015-10-01

Details

Check Text ( C-27829r2_chk )
If using AIDE, verify the configuration contains the acl option for all monitored files and directories. Here is an example AIDE configuration fragment.

SampleRule = p+i+l+n+u+g+s+m+c+acl+xattrs+sha256
/bin SampleRule

If the acl option is not present, this is a finding.

If using a different file integrity tool, check the configuration per tool documentation.
Fix Text (F-24101r1_fix)
If using AIDE, edit the configuration and add the acl option for all monitored files and directories.

If using a different file integrity tool, configure ACL checking per the tool's documentation.