STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

System audit tool executables must be owned by root.

DISA Rule

SV-227720r603266_rule

Vulnerability Number

V-227720

Group Title

SRG-OS-000256

Rule Version

GEN002715

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Change the owner of the audit tool executable to root.
# chown root [audit tool executable]

Check Contents

Verify the audit tool executables are owned by root.
# ls -l /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig
If any listed file is not owned by root, this is a finding.

Vulnerability Number

V-227720

Documentable

False

Rule Version

GEN002715

Severity Override Guidance

Verify the audit tool executables are owned by root.
# ls -l /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig
If any listed file is not owned by root, this is a finding.

Check Content Reference

M

Target Key

4061

Comments