SOL-11.1-100040 - The audit system must identify in which zone an event occurred.

Information

Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event.

Solution

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

List the non-global zones on the system.

# zoneadm list -vi | grep -v global

The Audit Configuration profile is required.

Enable the "zonename" auditing policy.

# pfexec auditconfig -setpolicy +zonename

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216241r959010_rule, STIG-ID|SOL-11.1-100040, STIG-Legacy|SV-60713, STIG-Legacy|V-47839, Vuln-ID|V-216241

Plugin: Unix

Control ID: 051c49eedbee6f1820df4b6ee40af23d5266b3e10e071f4bb14c8b0b6e201a58