GEN000000-SOL00080 - The /etc/security/audit_user file must be group-owned by root, sys, or bin.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Solaris audit_user file allows for selective auditing or non-auditing of features for certain users. If it is not protected, it could be compromised and used to mask audit events. This could cause the loss of valuable forensics data in the case of a system compromise.

Solution

Change the group owner of the audit_user file to root, bin, or sys.
Example:
# chgrp root /etc/security/audit_user

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_SPARC_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CCI|CCI-000366, CSCv6|3.1, Rule-ID|SV-226408r603265_rule, STIG-ID|GEN000000-SOL00080, STIG-Legacy|SV-4351, STIG-Legacy|V-4351, Vuln-ID|V-226408

Plugin: Unix

Control ID: f31bcaaa0e14156358cbd5eeaeef9c3fa5b67cc25279845b5581b65ad8090645