The operating system must alert designated organizational officials in the event of an audit processing failure.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216038 | SOL-11.1-010390 | SV-216038r958424_rule | CCI-000139 | high |
| Description | ||||
| Proper alerts to system administrators and IA officials of audit failures ensure a timely response to critical system issues. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216038r958424_chk)
This check applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this check applies.
The root role is required.
Verify the presence of an audit_warn entry in /etc/mail/aliases.
# /usr/lib/sendmail -bv audit_warn
If the response is:
audit_warn... User unknown
this is a finding.
Review the output of the command and verify that the audit_warn alias notifies the appropriate users in this form:
audit_warn:user1,user2
If an appropriate user is not listed, this is a finding.
Fix Text (F-17274r372497_fix)
The root role is required.
This action applies to the global zone only. Determine the zone that you are currently securing.
# zonename
If the command output is "global", this action applies.
Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s).
# pfedit /etc/mail/aliases
Insert a line in the form:
audit_warn:user1,user2
Put the updated aliases file into service.
# newaliases