CIS Solaris Ruler V1
Total Page:16
File Type:pdf, Size:1020Kb
Solaris Benchmark v1.1.0 Copyright 2001-2002, The Center for Internet Security http://www.CISecurity.org/ Solaris Benchmark v1.1.0 October 22, 2002 Copyright 2001-2002, The Center for Internet Security (CIS) Terms of Use Agreement 1. Grant of Permission to use the Solaris Download Package consisting of the Solaris Benchmark, software tools for scoring and monitoring the status of Benchmark settings at the network and system level, plus associated documentation. Subject to the terms and provisions listed below, CIS grants to you the nonexclusive and limited right to use the Solaris Download Package components. You are not receiving any ownership or proprietary right, title or interest in or to the Solaris Download Package components or the copyrights, trademarks, or other rights related thereto. 2. Limitations on Use. Receipt of the Solaris Download Package components does not permit you to: a. Sell the Solaris Download Package components; b. Lease or lend the Solaris Download Package components; c. Distribute the Solaris Download Package components by any means, including, but not limited to, through the Internet or other electronic distribution, direct mail, retail, or mail order (Certain internal distribution rights are specifically granted to CIS Consulting and User Members as noted in (2.e.) below); d. In any other manner and through any medium commercially exploit or use the Solaris Download Package components for any commercial purpose; e. Post the Benchmark, software tools, or associated documentation on any internal or external web site. (Consulting and User Members of CIS may distribute the Solaris Download Package components within their own organization); f. Represent or claim a particular level of compliance with the Solaris Benchmark unless the system is operated by a Consulting or User Member of CIS and has been scored against the Benchmark criteria by a monitoring tool obtained directly from CIS or a commercial monitoring tool certified by CIS. ii Special Terms of Use For US Federal Government Agencies and Authorized Federal Contractors Terms of Use within the entities and confines of the US Federal Government agencies and departments and by authorized federal contractors and sub-contractors, in accordance with the provisions of a federal government contract between the General Services Administration and The Center for Internet Security (CIS). These terms apply only for the six-month period beginning September 9, 2002, and ending March 8, 2003. 1. Grant of Permission to use and distribute the CIS Security Benchmarks and Scoring Tools: Subject to the terms and provisions listed below, CIS grants to every entity within the confines of the US Federal Government agencies and departments, the nonexclusive and limited right to use and distribute within the confines of the US Federal government agencies and departments and to authorized federal government contractors and sub-contractors, the CIS Benchmarks and Scoring Tools plus associated documentation, that are available via the CIS website (http://www.cisecurity.org), The entities within the confines of the US Federal Government agencies and departments are not receiving any ownership or proprietary right, title or interest in or to the CIS Security Benchmark documents or Scoring Tool software, or the copyrights, trademarks, or other rights related thereto. 2. Limitations on Use and Distribution. Receipt of the CIS Security Benchmarks or Scoring Tools does not permit: a. Selling, licensing, or leasing them, or exploiting them for any commercial purpose; b. Distributing them outside the entities within the confines of the US Federal Government agencies and departments by any means, including, but not limited to, the Internet or other electronic distribution. They may be distributed freely within the entities and confines of the US Federal Government agencies and departments, provided this Terms of Use language in its entirety is included. Distribution to any entities outside the confines of the US Federal Government agencies and departments is prohibited, except that distribution to federal government contractors and sub-contractors is permitted for contractor use in conjunction with their specific contractual requirements to complete assigned federal government tasks. Internal distribution by federal government contractors and sub-contractors within their organization is limited to contractor personnel directly involved in completing assigned government contract tasks. c. Posting the Benchmarks or Scoring Tools or associated documentation on any internal or external web site, except for the purpose of internal distribution within the entities and confines of the US Federal Government agencies and departments and to authorized federal government contractors and sub-contractors. Internal distribution by federal government contractors and sub-contractors is limited as noted in 2 b. above. iii CIS Solaris Benchmark 1 Patches ........................................................................................................................... 2 1.1 Apply latest OS patches......................................................................................... 2 2 Minimize inetd network services............................................................................... 3 2.1 Create empty /etc/inet/inetd.conf ......................................................... 3 2.2 Only enable telnet if absolutely necessary ....................................................... 3 2.3 Only enable FTP if absolutely necessary............................................................... 4 2.4 Only enable rlogin/rsh/rcp if absolutely necessary....................................... 4 2.5 Only enable TFTP if absolutely necessary ............................................................ 5 2.6 Only enable printer service if absolutely necessary............................................... 5 2.7 Only enable rquotad if absolutely necessary..................................................... 6 2.8 Only enable CDE-related daemons if absolutely necessary .................................. 6 2.9 Disable Solaris Volume Manager daemons unless needed.................................... 7 2.10 Disable Kerberos-related daemons unless needed................................................. 7 3 Minimize boot services.................................................................................................. 8 3.1 Turn off services which are not commonly used................................................... 8 3.2 Disable Windows-compatibility servers, if possible ............................................. 8 3.3 Disable NFS server processes, if possible ............................................................. 9 3.4 Disable NFS client processes, if possible .............................................................. 9 3.5 Disable other RPC-based services, if possible..................................................... 10 3.6 Disable Kerberos server daemons, if possible ..................................................... 10 3.7 Disable directory server, if possible..................................................................... 11 3.8 Disable LDAP cache manager, if possible .......................................................... 11 3.9 Disable printer daemons, if possible.................................................................... 12 3.10 Disable volume manager, if possible................................................................... 12 3.11 Disable GUI login, if possible ............................................................................. 13 3.12 Disable email server, if possible .......................................................................... 13 3.13 Disable Web server, if possible ........................................................................... 14 3.14 Disable SNMP, if possible................................................................................... 15 3.15 Disable DHCP server, if possible ........................................................................ 15 3.16 Prevent Syslog from accepting messages from network ..................................... 16 3.17 Turn on inetd tracing, disable inetd if possible............................................ 17 3.18 Disable login: prompts on serial ports........................................................... 17 3.19 Set daemon umask ............................................................................................... 18 4 Kernel Tuning .............................................................................................................. 18 4.1 Disable core dumps.............................................................................................. 18 4.2 Enable stack protection........................................................................................ 19 4.3 Restrict NFS client requests to privileged ports .................................................. 19 4.4 Network Parameter Modifications....................................................................... 20 4.5 Additional network parameter modifications ...................................................... 21 4.6 Use better TCP sequence numbers ...................................................................... 21 5 Logging........................................................................................................................ 22 5.1 Capture messages sent to syslog AUTH facility..................................................