Check: GEN000020
Solaris 9 X86 STIG:
GEN000020
(in version v1 r9)
Title
The system must require authentication upon booting into single-user and maintenance modes. (Cat II impact)
Discussion
If the system does not require valid root authentication before it boots into single-user or maintenance mode, anyone who invokes single-user or maintenance mode is granted privileged access to all files on the system.
Check Content
This can be checked in the /etc/rcS file (on Solaris 5.X systems) to check if the system runs sulogin, or an equivalent, when booting into single-user mode: # more /etc/rcS/sulogin Alternatively: # grep sulogin /etc/rcS NOTE: The file may be in /sbin. The last resort, if it is not a production system, is to boot the system to single-user mode: # shutdown -g0 -is -y If the system enters single-user mode and no password is required, this is a finding. NOTE: This is a default on Solaris 5.5.1 and later.
Fix Text
Edit /etc/rcS and set sulogin be run for single-user mode. NOTE: This is a default on Solaris 5.5.1 and later.
Additional Identifiers
Rule ID: SV-36754r1_rule
Vulnerability ID: V-756
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000213 |
The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
Controls
Number | Title |
---|---|
AC-3 |
Access Enforcement |