Create symlinks for dangerous files – /etc/hosts.equiv Details The /.rhosts, /.shosts, and /etc/hosts.equiv files enable a weak form of access control. Attackers will often target these files...
Create symlinks for dangerous files – /.rhosts Details The /.rhosts, /.shosts, and /etc/hosts.equiv files enable a weak form of access control. Attackers will often target these files...
Create symlinks for dangerous files – /.shosts Details The /.rhosts, /.shosts, and /etc/hosts.equiv files enable a weak form of access control. Attackers will often target these files...
Enable process accounting at boot time Details Process accounting logs information about every process that runs to completion on the system, including the amount of CPU...
Ensure Password Encryption Uses SHA algorithms ‘CRYPT_ALGORITHMS_ALLOW’ Details Solaris supports several different algorithms for password storage, including unix crypt, SHA256 and SHA512. The CRYPT_DEFAULT determines the default...
Ensure Password Encryption Uses SHA algorithms ‘CRYPT_DEFAULT’ Details Solaris supports several different algorithms for password storage, including unix crypt, SHA256 and SHA512. The CRYPT_DEFAULT determines the default...
Remove Support for Internet Services (inetd) Details If the actions in this section result in disabling all inetd-based services, then there is no point in running...
Restrict access to power management functions – CPRCHANGEPERM Details The settings in /etc/default/power control which users have access to the configuration settings for the system power management and...
Restrict access to power management functions – PMCHANGEPERM Details The settings in /etc/default/power control which users have access to the configuration settings for the system power management and...
Restrict access to sys-suspend feature Details The /etc/default/sys-suspend settings control which users are allowed to use the syssuspend command to shut down the system. Solution...