SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Failure to maintain system configurations may result in privilege escalation.

Solution

The Software Installation Profile is required.

Configure the package system to ensure that digital signatures are verified.

# pfexec pkg set-property signature-policy verify

Check that package permissions are configured per vendor requirements.

# pfexec pkg verify

If any errors are reported unrelated to STIG changes, use:

# pfexec pkg fix

to bring configuration settings and permissions into factory compliance.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001495, Rule-ID|SV-216284r603267_rule, STIG-ID|SOL-11.1-020050, STIG-Legacy|SV-60761, STIG-Legacy|V-47889, Vuln-ID|V-216284

Plugin: Unix

Control ID: bda13ef382c4960147b0400b1c391ed85883b7416f0784e4c9614e7e540a8bb5