SOL-11.1-010250 - The audit system must be configured to audit account modification - getpolicy

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without auditing, malicious activity cannot be detected.

Solution

The Audit Configuration profile is required. All audit flags must be enabled in a single command.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is 'global', this action applies.

For Solaris 11, 11.1, 11.2, and 11.3:
# pfexec auditconfig -setflags cusa,-ps,fd,-fa,fm

For Solaris 11.4 or newer:
# pfexec auditconfig -setflags cusa,-fa,-ex,-ps,fd,fm

Enable the audit policy to collect command line arguments.

# pfexec auditconfig -setpolicy +argv

These changes will not affect users that are currently logged in.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R2_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CAT|II, CCI|CCI-001403, Rule-ID|SV-216260r603267_rule, STIG-ID|SOL-11.1-010250, STIG-Legacy|SV-60685, STIG-Legacy|V-47809, Vuln-ID|V-216260

Plugin: Unix

Control ID: 903ea17a6c6be031eb34846d0582eed9d4b458facf86dca90f7b6eefe3440b92