Name: CIS Oracle Solaris 11.4 L1 v1.1.0
Updated: 2/28/2025
Authority: CIS
Plugin: Unix
Revision: 1.8
Estimated Item Count: 89
Filename: CIS_Oracle_Solaris_11.4_L1_v1.1.0.audit
Size: 270 kB
| Description | Categories |
|---|---|
| 1.1 Use the Latest Package Updates | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
| 2.1 Configure TCP Wrappers | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.2 Disable Local-only Graphical Login Environment | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.3 Configure sendmail Service for Local-Only Mode | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.4 Disable RPC Encryption Key | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.5 Disable Generic Security Services (GSS) | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.6 Disable Apache Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.7 Disable Kerberos TGT Expiration Warning | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.8 Disable NIS Client Services | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.9 Disable NIS Server Services | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.10 Disable Removable Volume Manager | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.11 Disable automount Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 2.12 Disable Telnet Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.1 Disable Response to Broadcast ICMPv4 Echo Request | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.2 Disable Response to ICMP Broadcast Netmask Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.3 Enable Strong TCP Sequence Number Generation | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.4 Disable Response to ICMP Broadcast Timestamp Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.5 Disable Source Packet Forwarding | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.6 Disable Directed Broadcast Packet Forwarding | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.7 Enable Stack Protection | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.8 Restrict Core Dumps to Protected Directory | MEDIA PROTECTION |
| 3.9 Disable Response to ICMP Timestamp Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.10 Disable Response to Multicast Echo Request | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.11 Ignore ICMP Redirect Messages | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.12 Set Strict Multihoming | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.13 Disable ICMP Redirect Messages | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.14 Disable TCP Reverse IP Source Routing | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.15 Set Maximum Number of Half-open TCP Connections | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.16 Set Maximum Number of Incoming Connections | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.17 Disable Network Routing | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 4.1 Create CIS Audit Class | AUDIT AND ACCOUNTABILITY |
| 4.2 Enable Auditing of Incoming Network Connections | AUDIT AND ACCOUNTABILITY |
| 4.3 Enable Auditing of File Metadata Modification Events | AUDIT AND ACCOUNTABILITY |
| 4.4 Enable Auditing of Process and Privilege Events | AUDIT AND ACCOUNTABILITY |
| 4.5 Configure Solaris Auditing | AUDIT AND ACCOUNTABILITY |
| 5.1 Set Sticky Bit on World Writable Directories | ACCESS CONTROL, MEDIA PROTECTION |
| 6.1 Disable login: Services on Serial Ports | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.2 Set EEPROM Security Mode and Log Failed Access (SPARC) | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
| 6.3 Restrict at/cron to Authorized Users | ACCESS CONTROL, MEDIA PROTECTION |
| 6.4 Set Default Screen Lock for GNOME Users | ACCESS CONTROL |
| 6.5 Remove Autologin Capabilities from the GNOME desktop | ACCESS CONTROL |
| 6.6 Set Delay between Failed Login Attempts to 4 | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
| 6.7 Disable Rhost-based Authentication for SSH | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.8 Restrict FTP Use | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.9 Disable root login for SSH | ACCESS CONTROL |
| 6.10 Disable Host-based Authentication for Login-based Services | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.11 Blocking Authentication Using Empty/Null Passwords for SSH | IDENTIFICATION AND AUTHENTICATION |
| 6.12 Limit Consecutive Login Attempts for SSH | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
| 6.13 Disable X11 Forwarding for SSH | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.14 Disable 'nobody' Access for RPC Encryption Key Storage Service | ACCESS CONTROL |