STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

System audit tool executables must be group-owned by root, bin, or sys.

DISA Rule

SV-227721r603266_rule

Vulnerability Number

V-227721

Group Title

SRG-OS-000256

Rule Version

GEN002716

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Change the group-owner of the audit tool executable to root, bin, or sys.

Procedure:
# chgrp root <audit tool executable>

Check Contents

Verify the audit tool executables are group-owned by root, bin, or sys.

Procedure:
# ls -lL /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig

If any listed file is not group-owned by root, bin, or sys, this is a finding.

Vulnerability Number

V-227721

Documentable

False

Rule Version

GEN002716

Severity Override Guidance

Verify the audit tool executables are group-owned by root, bin, or sys.

Procedure:
# ls -lL /usr/sbin/auditd /usr/sbin/audit /usr/sbin/bsmrecord /usr/sbin/auditreduce /usr/sbin/praudit /usr/sbin/auditconfig

If any listed file is not group-owned by root, bin, or sys, this is a finding.

Check Content Reference

M

Target Key

4061

Comments