Check: GEN000000-SOL00080
Solaris 9 X86 STIG:
GEN000000-SOL00080
(in version v1 r9)
Title
The /etc/security/audit_user file must be group-owned by root, sys, or bin. (Cat II impact)
Discussion
The Solaris audit_user file allows for selective auditing or non-auditing of features for certain users. If it is not protected, it could be compromised and used to mask audit events. This could cause the loss of valuable forensics data in the case of a system compromise.
Check Content
Check /etc/security/audit_user group ownership. # ls -lL /etc/security/audit_user If /etc/security/audit_user is not group owned by root, sys, or bin, this is a finding.
Fix Text
Change the group owner of the audit_user file to root, bin, or sys. Example: # chgrp root /etc/security/audit_user
Additional Identifiers
Rule ID: SV-4351r2_rule
Vulnerability ID: V-4351
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |