Audit records must include what type of events occurred.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216018 | SOL-11.1-010140 | SV-216018r958412_rule | CCI-000130 | medium |
| Description | ||||
| Without proper system auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216018r958412_chk)
The Audit Configuration profile is required.
This check applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this check applies.
Check the status of the audit system. It must be auditing.
# pfexec auditconfig -getcond
If this command does not report:
audit condition = auditing
this is a finding.
Fix Text (F-17254r372437_fix)
The Audit Control profile is required.
This action applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this action applies.
If auditing has been disabled, it must be enabled with the following command:
# pfexec audit -s