The auditing system must not define a different auditing level for specific users.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-216270 | SOL-11.1-010360 | SV-216270r959010_rule | Low |
Description |
Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account. |
STIG | Date |
Solaris 11 SPARC Security Technical Implementation Guide | 2024-11-25 |
Details
Check Text (C-17506r370898_chk) |
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. For each user on the system (not including root), check to see if special auditing flag configurations are set. # userattr audit_flags [username] If any flags are returned, this is a finding. |
Fix Text (F-17504r370899_fix) |
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. For each user on the system, remove all special audit configuration flags. # usermod -K audit_flags= [username] |