The audit system must alert the SA when the audit storage volume approaches its capacity.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-219993 | SOL-11.1-010370 | SV-219993r971542_rule | Medium |
Description |
Filling the audit storage area can result in a denial of service or system outage and can lead to events going undetected. |
STIG | Date |
Solaris 11 X86 Security Technical Implementation Guide | 2024-11-25 |
Details
Check Text (C-21703r372490_chk) |
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The root role is required. Verify the presence of an audit_warn entry in /etc/mail/aliases. # /usr/lib/sendmail -bv audit_warn If the response is: audit_warn... User unknown this is a finding. Review the output of the command and verify that the audit_warn alias notifies the appropriate users in this form: audit_warn:user1,user2 If an appropriate user is not listed, this is a finding. |
Fix Text (F-21702r372491_fix) |
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases |