Check: GEN000000-SOL00110
Solaris 9 X86 STIG:
GEN000000-SOL00110
(in version v1 r9)
Title
The /etc/security/audit_user file must not have an extended ACL. (Cat II impact)
Discussion
Audit_user is a sensitive file that, if compromised, would allow a malicious user to select auditing parameters to ignore their sessions. This would allow malicious operations the auditing subsystem would not detect for that user. It could also result in long-term system compromise possibly leading to the compromise of other systems and networks.
Check Content
Check the permissions of the file. # ls -lL /etc/security/audit_user If the permissions of the file contain a "+", an extended ACL is present, this is a finding.
Fix Text
Remove the extended ACL from the file. # getfacl /etc/security/audit_user Remove each ACE returned. # setfacl -d [ACE] /etc/security/audit_user
Additional Identifiers
Rule ID: SV-27003r1_rule
Vulnerability ID: V-22599
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000225 |
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned organizational tasks. |
Controls
Number | Title |
---|---|
AC-6 |
Least Privilege |