STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)

DISA Rule

SV-216217r603268_rule

Vulnerability Number

V-216217

Group Title

SRG-OS-000480

Rule Version

SOL-11.1-080120

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Consult the hardware vendor's documentation to determine how to start the system and access the BIOS controls.

Access the system's BIOS or system controller. Set a supervisor/administrator password if one has not been set. Disable a user-level password if one has been set.

Check Contents

This check applies to X86 compatible platforms.

On systems with a BIOS or system controller, verify a supervisor or administrator password is set. If a password is not set, this is a finding.

If the BIOS or system controller supports user-level access in addition to supervisor/administrator access, determine if this access is enabled. If so, this is a finding.

Vulnerability Number

V-216217

Documentable

False

Rule Version

SOL-11.1-080120

Severity Override Guidance

This check applies to X86 compatible platforms.

On systems with a BIOS or system controller, verify a supervisor or administrator password is set. If a password is not set, this is a finding.

If the BIOS or system controller supports user-level access in addition to supervisor/administrator access, determine if this access is enabled. If so, this is a finding.

Check Content Reference

M

Target Key

4021

Comments