SOL-11.1-090250 - The operating system must verify the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).

Information

Security functional testing involves testing the operating system for conformance to the operating system security function specifications, as well as for the underlying security model. The need to verify security functionality applies to all security functions. The conformance criteria state the conditions necessary for the operating system to exhibit the desired security behavior or satisfy a security property. For example, successful login triggers an audit entry.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Install, configure, and run DoD-approved SCAP compliance checking software on a periodic basis. Review the output of the software and document any out-of-compliance issues.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-6a., CAT|II, CCI|CCI-002696, Rule-ID|SV-220015r958944_rule, STIG-ID|SOL-11.1-090250, STIG-Legacy|SV-60779, STIG-Legacy|V-47907, Vuln-ID|V-220015

Plugin: Unix

Control ID: e3919a8a56a76d824ece38acacdce96daad4823a528b5f63f1ec9cdd5e7fb4f7