STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The centralized process core dump data directory must be group-owned by root, bin, or sys.

DISA Rule

SV-216211r603268_rule

Vulnerability Number

V-216211

Group Title

SRG-OS-000480

Rule Version

SOL-11.1-080060

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The root role is required.

Change the group-owner of the core file directory to root, bin or sys.

Example: # chgrp root [core file directory]

Check Contents

Check the defined directory for process core dumps.
# coreadm | grep "global core file pattern"

Check the group ownership of the directory.
# ls -lLd [core file directory]

If the directory is not group-owned by root, bin, or sys, this is a finding.

Vulnerability Number

V-216211

Documentable

False

Rule Version

SOL-11.1-080060

Severity Override Guidance

Check the defined directory for process core dumps.
# coreadm | grep "global core file pattern"

Check the group ownership of the directory.
# ls -lLd [core file directory]

If the directory is not group-owned by root, bin, or sys, this is a finding.

Check Content Reference

M

Target Key

4021

Comments