V-219984
SV-219984r958908_rule
CAT II
The operating system must protect the integrity of transmitted information.
From: Solaris 11 SPARC Security Technical Implementation Guide (V3R5)
Description
<VulnDiscussion>Ensuring the integrity of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
Check Procedure
The operator shall determine if IPsec is being used to encrypt data for activities such as cluster interconnects or other non-SSH, SFTP data connections.
On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation.
Check that the IPsec policy service is online:
# svcs svc:/network/ipsec/policy:default
If the IPsec service is not online, this is a finding.
If encrypted protocols are not used between systems, this is a finding.
Fix Text
The Service Management profile is required.
Configure IPsec encrypted tunneling between two systems.
On both systems review the file /etc/inet/ipsecinit.conf. Ensure that connections between hosts are configured properly in this file per the Solaris 11 documentation.
Ensure that the IPsec policy service is online:
Enable the IPsec service:
# svcadm enable svc:/network/ipsec/policy:default
CCI Reference
CCI-002418- Created
- 2026-04-07 20:08:34
- Last Updated
- 2026-04-07 20:08:34