An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
216
)
Print
Changes
Pages (
14/15
)
Solaris 11 X86 STIG
Solaris 11 X86 Security Technical Implementation Guide
v3 r2 (Released Jan. 30, 2025)
v3 r1 (Released July 24, 2024)
v2 r10 (Released April 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released Jan. 26, 2023)
v2 r6 (Released Jan. 27, 2022)
v2 r5 (Released Oct. 27, 2021)
v2 r4 (Released July 23, 2021)
v2 r3 (Released April 23, 2021)
v2 r2 (Released Jan. 22, 2021)
v2 r1 (Released Oct. 23, 2020)
v1 r22 (Released July 24, 2020)
v1 r21 (Released April 24, 2020)
v1 r20 (Released Jan. 24, 2020)
v1 r19 (Released Oct. 25, 2019)
v1 r18 (Released July 26, 2019)
v1 r17 (Released April 26, 2019)
v1 r16 (Released Oct. 26, 2018)
v1 r15 (Released July 27, 2018)
v1 r14 (Released April 27, 2018)
v1 r13 (Released Oct. 27, 2017)
v1 r12 (Released July 28, 2017)
v1 r11 (Released April 28, 2017)
v1 r10 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
SOL-11.1-090020
V-220014
The operating system must synchronize internal information system clocks with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
Cat II
SOL-11.1-090030
V-216223
Direct logins must not be permitted to shared, default, application, or utility accounts.
Cat II
SOL-11.1-090040
V-216224
The system must not have any unnecessary accounts.
Cat III
SOL-11.1-090050
V-216225
The operating system must conduct backups of user-level information contained in the operating system per organization-defined frequency to conduct backups consistent with recovery time and recovery point objectives.
Cat II
SOL-11.1-090060
V-216226
The operating system must conduct backups of system-level information contained in the information system per organization-defined frequency to conduct backups that are consistent with recovery time and recovery point objectives.
Cat II
SOL-11.1-090070
V-216227
The operating system must conduct backups of operating system documentation including security-related documentation per organization-defined frequency to conduct backups that is consistent with recovery time and recovery point objectives.
Cat II
SOL-11.1-090100
V-216228
The operating system must prevent the execution of prohibited mobile code.
Cat II
SOL-11.1-090115
V-216229
The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.
Cat II
SOL-11.1-090120
V-224672
The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.
Cat II
SOL-11.1-090130
V-216231
The operating system must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.
Cat II
SOL-11.1-090220
V-216233
The operating system must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
Cat II
SOL-11.1-090240
V-216234
All manual editing of system-relevant files shall be done using the pfedit command, which logs changes made to the files.
Cat III
SOL-11.1-090250
V-220015
The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).
Cat II
SOL-11.1-090270
V-224673
The operating system must identify potentially security-relevant error conditions.
Cat II
SOL-11.1-090280
V-216237
The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial of service attacks.
Cat II
Prev
1...
10
11
12
13
14
15
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.