SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.

Information

Failure to maintain system configurations may result in privilege escalation.

Solution

The Software Installation Profile is required.

Configure the package system to ensure that digital signatures are verified.

# pfexec pkg set-property signature-policy verify

Check that package permissions are configured per vendor requirements.

# pfexec pkg verify

If any errors are reported unrelated to STIG changes, use:

# pfexec pkg fix

to bring configuration settings and permissions into factory compliance.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V2R9_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9, CAT|II, CCI|CCI-001495, Rule-ID|SV-216049r603268_rule, STIG-ID|SOL-11.1-020050, STIG-Legacy|SV-60761, STIG-Legacy|V-47889, Vuln-ID|V-216049

Plugin: Unix

Control ID: 4806aa7c7ea17d468079a22a073dedab9441a536c7b57c9fbad81a5447ebf67c