The operating system must protect the integrity of transmitted information.
Overview
Finding ID | Version | Rule ID | IA Controls | Severity |
V-220012 | SOL-11.1-060190 | SV-220012r958908_rule | Medium |
Description |
Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks. |
STIG | Date |
Solaris 11 X86 Security Technical Implementation Guide | 2024-11-25 |
Details
Check Text (C-21722r372919_chk) |
The operator shall determine if IPsec is being used to encrypt data for activities such as cluster interconnects or other non-SSH, SFTP data connections. On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation. Check that the IPsec policy service is online: # svcs svc:/network/ipsec/policy:default If the IPsec service is not online, this is a finding. If encrypted protocols are not used between systems, this is a finding. |
Fix Text (F-21721r372920_fix) |
The Service Management profile is required. Configure IPsec encrypted tunneling between two systems. On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation. Ensure that the IPsec policy service is online: Enable the IPsec service: # svcadm enable svc:/network/ipsec/policy:default |