Skip to content

Solaris 11 SPARC Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The audit system must be configured to audit failed attempts to access files and programs.

    <VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000061

    <GroupDescription></GroupDescription>
    Group
  • X displays must not be exported to the world.

    &lt;VulnDiscussion&gt;Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set ...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.

    &lt;VulnDiscussion&gt;If access to the X server is not restricted, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The .Xauthority utility must only permit access to authorized hosts.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • X Window System connections that are not required must be disabled.

    &lt;VulnDiscussion&gt;If unauthorized clients are permitted access to the X server, a user's X session may be compromised.&lt;/VulnDiscussion&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • There must be no user .rhosts files.

    &lt;VulnDiscussion&gt;Even though the .rhosts files are ineffective if support is disabled in /etc/pam.conf, they may have been brought over from o...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Groups assigned to users must exist in the /etc/group file.

    &lt;VulnDiscussion&gt;Groups defined in passwd but not in group file pose a threat to system security since group permissions are not properly mana...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Users must have a valid home directory assignment.

    &lt;VulnDiscussion&gt;All users must be assigned a home directory in the passwd file. Failure to have a home directory may result in the user being...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All user accounts must be configured to use a home directory that exists.

    &lt;VulnDiscussion&gt;If the user's home directory does not exist, the user will be placed in "/" and will not be able to write any files or have l...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All home directories must be owned by the respective user assigned to it in /etc/passwd.

    &lt;VulnDiscussion&gt;Since the user is accountable for files stored in the user's home directory, the user must be the owner of the directory.&lt;...
    Rule Medium Severity
  • SRG-OS-000104

    <GroupDescription></GroupDescription>
    Group
  • Duplicate User IDs (UIDs) must not exist for users within the organization.

    &lt;VulnDiscussion&gt;Users within the organization must be assigned unique UIDs for accountability and to ensure appropriate access protections.&l...
    Rule Medium Severity
  • SRG-OS-000121

    <GroupDescription></GroupDescription>
    Group
  • Duplicate UIDs must not exist for multiple non-organizational users.

    &lt;VulnDiscussion&gt;Non-organizational users must be assigned unique UIDs for accountability and to ensure appropriate access protections.&lt;/Vu...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Duplicate Group IDs (GIDs) must not exist for multiple groups.

    &lt;VulnDiscussion&gt;User groups must be assigned unique GIDs for accountability and to ensure appropriate access protections.&lt;/VulnDiscussion&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must configure auditing to reduce the likelihood of storage capacity being exceeded.

    &lt;VulnDiscussion&gt;Overflowing the audit storage area can result in a denial of service or system outage.&lt;/VulnDiscussion&gt;&lt;FalsePositiv...
    Rule High Severity
  • SRG-OS-000366

    <GroupDescription></GroupDescription>
    Group
  • The system must verify that package updates are digitally signed.

    &lt;VulnDiscussion&gt;Digitally signed packages ensure that the source of the package can be identified.&lt;/VulnDiscussion&gt;&lt;FalsePositives&g...
    Rule Medium Severity
  • SRG-OS-000363

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit login, logout, and session initiation.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000241

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account termination.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000278

    <GroupDescription></GroupDescription>
    Group
  • The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Permissions on user .netrc files must be 750 or less permissive.

    &lt;VulnDiscussion&gt;.netrc files may contain unencrypted passwords that can be used to attack other systems.&lt;/VulnDiscussion&gt;&lt;FalsePosit...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • System packages must be configured with the vendor-provided files, permissions, and ownerships.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The finger daemon package must not be installed.

    &lt;VulnDiscussion&gt;Finger is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The legacy remote network access utilities daemons must not be installed.

    &lt;VulnDiscussion&gt;Legacy remote access utilities allow remote control of a system without proper authentication.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The NIS package must not be installed.

    &lt;VulnDiscussion&gt;NIS is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/Fa...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules