Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000064

    <GroupDescription></GroupDescription>
    Group
  • The operating system must generate audit records for the selected list of auditable events as defined in DoD list of events.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity
  • SRG-OS-000037

    <GroupDescription></GroupDescription>
    Group
  • Audit records must include what type of events occurred.

    &lt;VulnDiscussion&gt;Without proper system auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and t...
    Rule Medium Severity
  • SRG-OS-000038

    <GroupDescription></GroupDescription>
    Group
  • Audit records must include when (date and time) the events occurred.

    &lt;VulnDiscussion&gt;Without accurate time stamps malicious activity cannot be accurately tracked.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000039

    <GroupDescription></GroupDescription>
    Group
  • Audit records must include where the events occurred.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity
  • SRG-OS-000040

    <GroupDescription></GroupDescription>
    Group
  • Audit records must include the sources of the events that occurred.

    &lt;VulnDiscussion&gt;Without accurate source information malicious activity cannot be accurately tracked.&lt;/VulnDiscussion&gt;&lt;FalsePositives...
    Rule Medium Severity
  • SRG-OS-000041

    <GroupDescription></GroupDescription>
    Group
  • Audit records must include the outcome (success or failure) of the events that occurred.

    &lt;VulnDiscussion&gt;Tracking both the successful and unsuccessful attempts aids in identifying threats to the system.&lt;/VulnDiscussion&gt;&lt;F...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit all administrative, privileged, and security actions.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity
  • SRG-OS-000032

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit login, logout, and session initiation.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit failed attempts to access files and programs.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000061

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect against an individual falsely denying having performed a particular action. In order to do so the system must be configured to send audit records to a remote audit server.

    &lt;VulnDiscussion&gt;Keeping audit records on a remote system reduces the likelihood of audit records being changed or corrupted. Duplicating and ...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The auditing system must not define a different auditing level for specific users.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Low Severity
  • SRG-OS-000046

    <GroupDescription></GroupDescription>
    Group
  • The operating system must alert designated organizational officials in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;Proper alerts to system administrators and IA officials of audit failures ensure a timely response to critical system issues....
    Rule High Severity
  • SRG-OS-000047

    <GroupDescription></GroupDescription>
    Group
  • The operating system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;Continuing to operate a system without auditing working properly can result in undocumented access or system changes.&lt;/Vul...
    Rule Medium Severity
  • SRG-OS-000057

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit information from unauthorized access.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The System packages must be up to date with the most recent vendor updates and security fixes.

    &lt;VulnDiscussion&gt;Failure to install security updates can provide openings for attack.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePo...
    Rule Medium Severity
  • SRG-OS-000256

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized access.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000257

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized modification.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000258

    <GroupDescription></GroupDescription>
    Group
  • The operating system must protect audit tools from unauthorized deletion.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000278

    <GroupDescription></GroupDescription>
    Group
  • System packages must be configured with the vendor-provided files, permissions, and ownerships.

    &lt;VulnDiscussion&gt;Failure to maintain system configurations may result in privilege escalation.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The finger daemon package must not be installed.

    &lt;VulnDiscussion&gt;Finger is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The rpcbind service must be configured for local only services unless organizationally defined.

    &lt;VulnDiscussion&gt;The portmap and rpcbind services increase the attack surface of the system and should only be used when needed. The portmap o...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The VNC server package must not be installed unless required.

    &lt;VulnDiscussion&gt;The VNC service uses weak authentication capabilities and provides the user complete graphical system access.&lt;/VulnDiscuss...
    Rule Medium Severity
  • SRG-OS-000095

    <GroupDescription></GroupDescription>
    Group
  • The operating system must be configured to provide essential capabilities.

    &lt;VulnDiscussion&gt;Operating systems are capable of providing a wide variety of functions and services. Execution must be disabled based on orga...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All run control scripts must have mode 0755 or less permissive.

    &lt;VulnDiscussion&gt;If the startup files are writable by other users, these users could modify the startup files to insert malicious commands int...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • All run control scripts must have no extended ACLs.

    &lt;VulnDiscussion&gt;If the startup files are writable by other users, these users could modify the startup files to insert malicious commands int...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules