Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000142

    <GroupDescription></GroupDescription>
    Group
  • The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial of service attacks.

    &lt;VulnDiscussion&gt;In the case of denial of service attacks, care must be taken when designing the operating system so as to ensure that the ope...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The /etc/zones directory, and its contents, must have the vendor default owner, group, and permissions.

    &lt;VulnDiscussion&gt;Incorrect ownership can result in unauthorized changes or theft of data.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/Fal...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The limitpriv zone option must be set to the vendor default or less permissive.

    &lt;VulnDiscussion&gt;Solaris zones can be assigned privileges generally reserved for the global zone using the "limitpriv" zone option. Any privil...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The systems physical devices must not be assigned to non-global zones.

    &lt;VulnDiscussion&gt;Solaris non-global zones can be assigned physical hardware devices. This increases the risk of such a non-global zone having ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must identify in which zone an event occurred.

    &lt;VulnDiscussion&gt;Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event.&...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must maintain a central audit trail for all zones.

    &lt;VulnDiscussion&gt;Centralized auditing simplifies the investigative process to determine the cause of a security event.&lt;/VulnDiscussion&gt;&...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must monitor for unauthorized connections of mobile devices to organizational information systems.

    &lt;VulnDiscussion&gt;Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and...
    Rule Medium Severity
  • SRG-OS-000349

    <GroupDescription></GroupDescription>
    Group
  • The audit system must support an audit reduction capability.

    &lt;VulnDiscussion&gt;Using the audit system will utilize the audit reduction capability. Without an audit reduction capability, users find it diff...
    Rule Medium Severity
  • SRG-OS-000352

    <GroupDescription></GroupDescription>
    Group
  • The audit system records must be able to be used by a report generation capability.

    &lt;VulnDiscussion&gt;Enabling the audit system will produce records for use in report generation. Without an audit reporting capability, users fi...
    Rule Medium Severity
  • SRG-OS-000062

    <GroupDescription></GroupDescription>
    Group
  • The audit records must provide data for all auditable events defined at the organizational level for the organization-defined information system components.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules