STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The system's access control program must be configured to grant or deny system access to specific hosts.

DISA Rule

SV-220118r603266_rule

Vulnerability Number

V-220118

Group Title

SRG-OS-000480

Rule Version

GEN006620

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the /etc/hosts.allow and /etc/hosts.deny files to configure access restrictions.

Check Contents

Check for the existence of the /etc/hosts.allow and /etc/hosts.deny files.

Procedure:
# ls -la /etc/hosts.allow
# ls -la /etc/hosts.deny

If either file does not exist, this is a finding.

Check for the presence of a default deny entry.

Procedure:
# grep "ALL: ALL" /etc/hosts.deny

If the "ALL: ALL" entry is not present in the /etc/hosts.deny file, any TCP service from a host or network not matching other rules will be allowed access. If the entry is not in /etc/hosts.deny, this is a finding.

Vulnerability Number

V-220118

Documentable

False

Rule Version

GEN006620

Severity Override Guidance

Check for the existence of the /etc/hosts.allow and /etc/hosts.deny files.

Procedure:
# ls -la /etc/hosts.allow
# ls -la /etc/hosts.deny

If either file does not exist, this is a finding.

Check for the presence of a default deny entry.

Procedure:
# grep "ALL: ALL" /etc/hosts.deny

If the "ALL: ALL" entry is not present in the /etc/hosts.deny file, any TCP service from a host or network not matching other rules will be allowed access. If the entry is not in /etc/hosts.deny, this is a finding.

Check Content Reference

M

Target Key

4061

Comments