An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
216
)
Print
Changes
Pages (
10/15
)
Solaris 11 X86 STIG
Solaris 11 X86 Security Technical Implementation Guide
v3 r2 (Released Jan. 30, 2025)
v3 r1 (Released July 24, 2024)
v2 r10 (Released April 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released Jan. 26, 2023)
v2 r6 (Released Jan. 27, 2022)
v2 r5 (Released Oct. 27, 2021)
v2 r4 (Released July 23, 2021)
v2 r3 (Released April 23, 2021)
v2 r2 (Released Jan. 22, 2021)
v2 r1 (Released Oct. 23, 2020)
v1 r22 (Released July 24, 2020)
v1 r21 (Released April 24, 2020)
v1 r20 (Released Jan. 24, 2020)
v1 r19 (Released Oct. 25, 2019)
v1 r18 (Released July 26, 2019)
v1 r17 (Released April 26, 2019)
v1 r16 (Released Oct. 26, 2018)
v1 r15 (Released July 27, 2018)
v1 r14 (Released April 27, 2018)
v1 r13 (Released Oct. 27, 2017)
v1 r12 (Released July 28, 2017)
v1 r11 (Released April 28, 2017)
v1 r10 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
SOL-11.1-050460
V-216162
The operating system must terminate all sessions and network connections when nonlocal maintenance is completed.
Cat II
SOL-11.1-050470
V-216163
The operating system must prevent internal users from sending out packets which attempt to manipulate or spoof invalid IP addresses.
Cat II
SOL-11.1-050480
V-216164
Wireless network adapters must be disabled.
Cat II
SOL-11.1-060010
V-216165
The operating system must use mechanisms for authentication to a cryptographic module meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for such authentication.
Cat II
SOL-11.1-060060
V-220003
The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.
Cat II
SOL-11.1-060070
V-220004
The operating system must protect the integrity of transmitted information.
Cat II
SOL-11.1-060080
V-220005
The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.
Cat II
SOL-11.1-060090
V-220006
The operating system must maintain the integrity of information during aggregation, packaging, and transformation in preparation for transmission.
Cat II
SOL-11.1-060100
V-220007
The operating system must protect the confidentiality of transmitted information.
Cat II
SOL-11.1-060110
V-220008
The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.
Cat II
SOL-11.1-060120
V-220009
The operating system must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission.
Cat II
SOL-11.1-060130
V-216173
The operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
Cat II
SOL-11.1-060140
V-216174
The operating system must use cryptographic mechanisms to protect and restrict access to information on portable digital media.
Cat II
SOL-11.1-060150
V-220010
The operating system must employ cryptographic mechanisms to protect information in storage.
Cat III
SOL-11.1-060160
V-216176
The operating system must protect the confidentiality and integrity of information at rest.
Cat III
Prev
1...
6
7
8
9
10
11
12
13
14
...15
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.