SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.

Information

Addition of unauthorized code or packages may result in data corruption or theft.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The Software Installation Profile is required.

Review and report any unauthorized package installation operations.

If necessary, remove unauthorized packages.

# pfexec pkg uninstall [package name]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V2R9_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-3(5), CAT|II, CCI|CCI-001744, Rule-ID|SV-219970r854533_rule, STIG-ID|SOL-11.1-020190, STIG-Legacy|SV-60795, STIG-Legacy|V-47923, Vuln-ID|V-219970

Plugin: Unix

Control ID: a0b1c5b66fbf4c3d5dbd7d4960e020ac273685218f0cbf698365f9fde6749e34