STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The centralized process core dump data directory must be owned by root.

DISA Rule

SV-216210r603268_rule

Vulnerability Number

V-216210

Group Title

SRG-OS-000480

Rule Version

SOL-11.1-080050

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The root role is required.

Change the owner of the core file directory.

# chown root [core file directory]

Check Contents

Check the defined directory for process core dumps.
# coreadm | grep "global core file pattern"

Check the ownership of the directory.
# ls -lLd [core file directory]

If the directory is not owned by root, this is a finding.

Vulnerability Number

V-216210

Documentable

False

Rule Version

SOL-11.1-080050

Severity Override Guidance

Check the defined directory for process core dumps.
# coreadm | grep "global core file pattern"

Check the ownership of the directory.
# ls -lLd [core file directory]

If the directory is not owned by root, this is a finding.

Check Content Reference

M

Target Key

4021

Comments