Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Duplicate User IDs (UIDs) must not exist for users within the organization.

    <VulnDiscussion>Users within the organization must be assigned unique UIDs for accountability and to ensure appropriate access protections.&l...
    Rule Medium Severity
  • SRG-OS-000121

    <GroupDescription></GroupDescription>
    Group
  • Duplicate UIDs must not exist for multiple non-organizational users.

    &lt;VulnDiscussion&gt;Non-organizational users must be assigned unique UIDs for accountability and to ensure appropriate access protections.&lt;/Vu...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Duplicate Group IDs (GIDs) must not exist for multiple groups.

    &lt;VulnDiscussion&gt;User groups must be assigned unique GIDs for accountability and to ensure appropriate access protections.&lt;/VulnDiscussion&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must configure auditing to reduce the likelihood of storage capacity being exceeded.

    &lt;VulnDiscussion&gt;Overflowing the audit storage area can result in a denial of service or system outage.&lt;/VulnDiscussion&gt;&lt;FalsePositiv...
    Rule High Severity
  • SRG-OS-000366

    <GroupDescription></GroupDescription>
    Group
  • The system must verify that package updates are digitally signed.

    &lt;VulnDiscussion&gt;Digitally signed packages ensure that the source of the package can be identified.&lt;/VulnDiscussion&gt;&lt;FalsePositives&g...
    Rule Medium Severity
  • SRG-OS-000363

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit login, logout, and session initiation.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000241

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account termination.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000278

    <GroupDescription></GroupDescription>
    Group
  • The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules