Skip to content

Solaris 11 X86 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The system must disable accounts after three consecutive unsuccessful login attempts.

    <VulnDiscussion>Allowing continued access to accounts on the system exposes them to brute-force password-guessing attacks.</VulnDiscussion...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000021

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000003

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Login must not be permitted with empty/null passwords for SSH.

    &lt;VulnDiscussion&gt;Permitting login without a password is inherently risky.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule High Severity
  • SRG-OS-000163

    <GroupDescription></GroupDescription>
    Group
  • Permissions on user .netrc files must be 750 or less permissive.

    &lt;VulnDiscussion&gt;.netrc files may contain unencrypted passwords that can be used to attack other systems.&lt;/VulnDiscussion&gt;&lt;FalsePosit...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The legacy remote network access utilities daemons must not be installed.

    &lt;VulnDiscussion&gt;Legacy remote access utilities allow remote control of a system without proper authentication.&lt;/VulnDiscussion&gt;&lt;Fals...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The NIS package must not be installed.

    &lt;VulnDiscussion&gt;NIS is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/Fa...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The pidgin IM client package must not be installed.

    &lt;VulnDiscussion&gt;Instant messaging is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegati...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The FTP daemon must not be installed unless required.

    &lt;VulnDiscussion&gt;FTP is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/Fa...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The TFTP service daemon must not be installed unless required.

    &lt;VulnDiscussion&gt;TFTP is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/F...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The telnet service daemon must not be installed unless required.

    &lt;VulnDiscussion&gt;Telnet is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;...
    Rule High Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The UUCP service daemon must not be installed unless required.

    &lt;VulnDiscussion&gt;UUCP is an insecure protocol.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/F...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • Duplicate user names must not exist.

    &lt;VulnDiscussion&gt;If a user is assigned a duplicate user name, it will create and have access to files with the first UID for that username in ...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The root account must be the only account with GID of 0.

    &lt;VulnDiscussion&gt;All accounts with a GID of 0 have root group privileges and must be limited to the group account only.&lt;/VulnDiscussion&gt;...
    Rule Medium Severity
  • SRG-OS-000206

    <GroupDescription></GroupDescription>
    Group
  • The audit system must maintain a central audit trail for all zones.

    &lt;VulnDiscussion&gt;Centralized auditing simplifies the investigative process to determine the cause of a security event.&lt;/VulnDiscussion&gt;&...
    Rule Low Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit file deletions.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000004

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit account creation.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000239

    <GroupDescription></GroupDescription>
    Group
  • The audit system must be configured to audit account modification.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000240

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000241

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000255

    <GroupDescription></GroupDescription>
    Group
  • The audit system must produce records containing sufficient information to establish the identity of any user/subject associated with the event.

    &lt;VulnDiscussion&gt;Enabling the audit system will produce records with accurate time stamps, source, user, and activity information. Without thi...
    Rule Medium Severity
  • SRG-OS-000054

    <GroupDescription></GroupDescription>
    Group
  • The operating system must provide the capability to automatically process audit records for events of interest based upon selectable, event criteria.

    &lt;VulnDiscussion&gt;Without an audit reporting capability, users find it difficult to identify specific patterns of attack.&lt;/VulnDiscussion&gt...
    Rule Medium Severity
  • SRG-OS-000062

    <GroupDescription></GroupDescription>
    Group
  • The operating system must automatically audit account termination.

    &lt;VulnDiscussion&gt;Without auditing, malicious activity cannot be detected.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&...
    Rule Medium Severity
  • SRG-OS-000480

    <GroupDescription></GroupDescription>
    Group
  • The audit records must provide data for all auditable events defined at the organizational level for the organization-defined information system components.

    &lt;VulnDiscussion&gt;Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules