Name: CIS Oracle Solaris 11.4 L1 v1.1.0
Updated: 2/28/2025
Authority: CIS
Plugin: Unix
Revision: 1.8
Estimated Item Count: 89
Filename: CIS_Oracle_Solaris_11.4_L1_v1.1.0.audit
Size: 270 kB
Description | Categories |
---|---|
1.1 Use the Latest Package Updates | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
2.1 Configure TCP Wrappers | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Disable Local-only Graphical Login Environment | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.3 Configure sendmail Service for Local-Only Mode | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.4 Disable RPC Encryption Key | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.5 Disable Generic Security Services (GSS) | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.6 Disable Apache Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.7 Disable Kerberos TGT Expiration Warning | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.8 Disable NIS Client Services | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.9 Disable NIS Server Services | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.10 Disable Removable Volume Manager | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.11 Disable automount Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.12 Disable Telnet Service | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.1 Disable Response to Broadcast ICMPv4 Echo Request | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.2 Disable Response to ICMP Broadcast Netmask Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.3 Enable Strong TCP Sequence Number Generation | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4 Disable Response to ICMP Broadcast Timestamp Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.5 Disable Source Packet Forwarding | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.6 Disable Directed Broadcast Packet Forwarding | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.7 Enable Stack Protection | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.8 Restrict Core Dumps to Protected Directory | MEDIA PROTECTION |
3.9 Disable Response to ICMP Timestamp Requests | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.10 Disable Response to Multicast Echo Request | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.11 Ignore ICMP Redirect Messages | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.12 Set Strict Multihoming | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.13 Disable ICMP Redirect Messages | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.14 Disable TCP Reverse IP Source Routing | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.15 Set Maximum Number of Half-open TCP Connections | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.16 Set Maximum Number of Incoming Connections | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.17 Disable Network Routing | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.1 Create CIS Audit Class | AUDIT AND ACCOUNTABILITY |
4.2 Enable Auditing of Incoming Network Connections | AUDIT AND ACCOUNTABILITY |
4.3 Enable Auditing of File Metadata Modification Events | AUDIT AND ACCOUNTABILITY |
4.4 Enable Auditing of Process and Privilege Events | AUDIT AND ACCOUNTABILITY |
4.5 Configure Solaris Auditing | AUDIT AND ACCOUNTABILITY |
5.1 Set Sticky Bit on World Writable Directories | ACCESS CONTROL, MEDIA PROTECTION |
6.1 Disable login: Services on Serial Ports | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.2 Set EEPROM Security Mode and Log Failed Access (SPARC) | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
6.3 Restrict at/cron to Authorized Users | ACCESS CONTROL, MEDIA PROTECTION |
6.4 Set Default Screen Lock for GNOME Users | ACCESS CONTROL |
6.5 Remove Autologin Capabilities from the GNOME desktop | ACCESS CONTROL |
6.6 Set Delay between Failed Login Attempts to 4 | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
6.7 Disable Rhost-based Authentication for SSH | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.8 Restrict FTP Use | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.9 Disable root login for SSH | ACCESS CONTROL |
6.10 Disable Host-based Authentication for Login-based Services | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.11 Blocking Authentication Using Empty/Null Passwords for SSH | IDENTIFICATION AND AUTHENTICATION |
6.12 Limit Consecutive Login Attempts for SSH | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
6.13 Disable X11 Forwarding for SSH | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.14 Disable 'nobody' Access for RPC Encryption Key Storage Service | ACCESS CONTROL |