The operating system must protect audit tools from unauthorized deletion.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-216049 | SOL-11.1-020050 | SV-216049r958614_rule | CCI-001495 | medium |
| Description | ||||
| Failure to maintain system configurations may result in privilege escalation. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-216049r958614_chk)
The Software Installation Profile is required.
Determine what the signature policy is for pkg publishers:
# pkg property | grep signature-policy
Check that output produces:
signature-policy verify
If the output does not confirm that signature-policy verify is active, this is a finding.
Check that package permissions are configured and signed per vendor requirements.
# pkg verify
If the command produces any output unrelated to STIG changes, this is a finding.
There is currently a Solaris 11 bug 16267888 which reports pkg verify errors for a variety of python packages. These can be ignored.
Fix Text (F-17285r372530_fix)
The Software Installation Profile is required.
Configure the package system to ensure that digital signatures are verified.
# pfexec pkg set-property signature-policy verify
Check that package permissions are configured per vendor requirements.
# pfexec pkg verify
If any errors are reported unrelated to STIG changes, use:
# pfexec pkg fix
to bring configuration settings and permissions into factory compliance.