SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Addition of unauthorized code or packages may result in data corruption or theft.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The Software Installation Profile is required.

Review and report any unauthorized package installation operations.

If necessary, remove unauthorized packages.

# pfexec pkg uninstall [package name]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001744, Rule-ID|SV-219998r854558_rule, STIG-ID|SOL-11.1-020190, STIG-Legacy|SV-60795, STIG-Legacy|V-47923, Vuln-ID|V-219998

Plugin: Unix

Control ID: 8a3ebd4539ecc0d8bd2ba982eeed4c5a7639a10c91d19c3644700974f03d3f81