SOL-11.1-100040 - The audit system must identify in which zone an event occurred.

Information

Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event.

Solution

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is 'global', this check applies.

List the non-global zones on the system.

# zoneadm list -vi | grep -v global

The Audit Configuration profile is required.

Enable the 'zonename' auditing policy.

# pfexec auditconfig -setpolicy +zonename

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216241r959010_rule, STIG-ID|SOL-11.1-100040, STIG-Legacy|SV-60713, STIG-Legacy|V-47839, Vuln-ID|V-216241

Plugin: Unix

Control ID: 31b09f9d86be852d5317d2e9de54659d6733394a2ca3b11786946d1160278e1d