The operating system must protect the integrity of transmitted information.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-220012 | SOL-11.1-060190 | SV-220012r958908_rule | CCI-002418 | medium |
| Description | ||||
| Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks. | ||||
| STIG | Date | |||
| Solaris 11 X86 Security Technical Implementation Guide | 2025-05-05 | |||
Details
Check Text (C-220012r958908_chk)
The operator shall determine if IPsec is being used to encrypt data for activities such as cluster interconnects or other non-SSH, SFTP data connections.
On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation.
Check that the IPsec policy service is online:
# svcs svc:/network/ipsec/policy:default
If the IPsec service is not online, this is a finding.
If encrypted protocols are not used between systems, this is a finding.
Fix Text (F-21721r372920_fix)
The Service Management profile is required.
Configure IPsec encrypted tunneling between two systems.
On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation.
Ensure that the IPsec policy service is online:
Enable the IPsec service:
# svcadm enable svc:/network/ipsec/policy:default