Check: GEN000440
Solaris 9 X86 STIG:
GEN000440
(in version v1 r9)
Title
Successful and unsuccessful logins and logouts must be logged. (Cat II impact)
Discussion
Monitoring and recording successful and unsuccessful logins assist in tracking unauthorized access to the system. Without this logging, the ability to track unauthorized activity to specific user accounts may be diminished.
Check Content
Determine if successful logons are being logged. # last | more Determine if unsuccessful logons are being logged. # more /var/adm/loginlog If the commands do not return successful and unsuccessful logins, this is a finding. Check the syslog daemon configuration for authentication logging. # egrep "auth\.(info|debug)" /etc/syslog.conf If there are no entries in syslog for the auth service, this is a finding.
Fix Text
Verify that login logs are handled correctly in the /etc/syslog.conf file. Edit the /etc/syslog.conf file and add one of the entries below. auth.debug /var/log/authlog OR auth.* /var/log/authlog Verify that service startup scripts for syslog and utmp (if present) are enabled.
Additional Identifiers
Rule ID: SV-27080r1_rule
Vulnerability ID: V-765
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000126 |
Specify the organization-defined event types (subset of the event types defined in AU-2a) along with the frequency of (or situation requiring logging for each identified event type. |
Controls
Number | Title |
---|---|
AU-2 |
Audit Events |