SOL-11.1-100040 - The audit system must identify in which zone an event occurred.

Information

Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event.

Solution

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is 'global', this check applies.

List the non-global zones on the system.

# zoneadm list -vi | grep -v global

The Audit Configuration profile is required.

Enable the 'zonename' auditing policy.

# pfexec auditconfig -setpolicy +zonename

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_SPARC_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216477r959010_rule, STIG-ID|SOL-11.1-100040, STIG-Legacy|SV-60713, STIG-Legacy|V-47839, Vuln-ID|V-216477

Plugin: Unix

Control ID: 93ea9718a5f602228b745c7e57c731b8730817b8302d1dba701dac5b1c80152b