Check: SOL-11.1-010390
Solaris 11 SPARC STIG:
SOL-11.1-010390
(in versions v3 r2 through v1 r10)
Title
The operating system must alert designated organizational officials in the event of an audit processing failure. (Cat I impact)
Discussion
Proper alerts to system administrators and IA officials of audit failures ensure a timely response to critical system issues.
Check Content
This check applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this check applies. The root role is required. Verify the presence of an audit_warn entry in /etc/mail/aliases. # /usr/lib/sendmail -bv audit_warn If the response is: audit_warn... User unknown this is a finding. Review the output of the command and verify that the audit_warn alias notifies the appropriate users in this form: audit_warn:user1,user2 If an appropriate user is not listed, this is a finding.
Fix Text
The root role is required. This action applies to the global zone only. Determine the zone that you are currently securing. # zonename If the command output is "global", this action applies. Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s). # pfedit /etc/mail/aliases Insert a line in the form: audit_warn:user1,user2 Put the updated aliases file into service. # newaliases
Additional Identifiers
Rule ID: SV-216273r958424_rule
Vulnerability ID: V-216273
Group Title: SRG-OS-000046
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000139 |
Alert organization-defined personnel or roles within an organization-defined time period in the event of an audit logging process failure. |
Controls
Number | Title |
---|---|
AU-5 |
Response to Audit Processing Failures |