The operating system must maintain the integrity of information during aggregation, packaging, and transformation in preparation for transmission.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-220006 | SOL-11.1-060090 | SV-220006r958912_rule | CCI-002420 | medium |
| Description | ||||
| Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-220006r958912_chk)
All remote sessions must be conducted via encrypted services and ports.
Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.
Fix Text (F-21715r372890_fix)
All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used.