The auditing system must not define a different auditing level for specific users.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216035 | SOL-11.1-010360 | SV-216035r959010_rule | CCI-000366 | low |
| Description | ||||
| Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to an individual account. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216035r959010_chk)
This check applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this check applies.
For each user on the system (not including root), check to see if special auditing flag configurations are set.
# userattr audit_flags [username]
If any flags are returned, this is a finding.
Fix Text (F-17271r372488_fix)
The root role is required.
This action applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this action applies.
For each user on the system, remove all special audit configuration flags.
# usermod -K audit_flags= [username]