Check: GEN002660
Solaris 10 X86 STIG:
GEN002660
(in versions v2 r4 through v2 r1)
Title
Auditing must be implemented. (Cat II impact)
Discussion
Without auditing, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account.
Check Content
Determine the type of zone that you are currently securing. # zonename If the output of "zonename" is "global", then auditing must be enabled. Determine if auditing is enabled. # ps -ef |grep auditd If the auditd process is not found, this is a finding. If the output of "zonename" is not "global", then the "perzone" policy must be determined. # auditconfig --getpolicy audit policies = cnt,perzone If "perzone" is not listed then this requirement is not applicable. If "perzone" is listed then determine if auditing is enabled. # ps -ef |grep auditd If the auditd process is not found, this is a finding.
Fix Text
Use /etc/security/bsmconv to enable auditing on the system.
Additional Identifiers
Rule ID: SV-227715r603266_rule
Vulnerability ID: V-227715
Group Title: SRG-OS-000062
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000169 |
The information system provides audit record generation capability for the auditable events defined in AU-2 a. at organization-defined information system components. |
Controls
Number | Title |
---|---|
AU-12 |
Audit Generation |