National Vulnerability Database

National Vulnerability Database

National Vulnerability

CIS Solaris 2.5.1-9 Benchmark v1.3.0 Checklist Details (Checklist Revisions)

Supporting Resources:


Target CPE Name Product Category
Sun Solaris 2.5.1 cpe:/o:sun:solaris:2.5.1 (View CVEs)
  • Operating System

Checklist Highlights

Checklist Name:
CIS Solaris 2.5.1-9 Benchmark
Checklist ID:
Review Status:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
Checklist Group:

Checklist Summary:

This document provides recommendations for securing Solaris operating systems. This benchmark document covers Solaris version 2.5.1 and later for both servers and desktops. Desktop systems typically have different security expectations than server-class systems. In an effort to facilitate use of this benchmark on these different classes of machines, shaded text has been used to indicate questions and/or actions that are typically not applicable to desktop systems in a large enterprise environment. These shaded items may be skipped on these desktop platforms.

Checklist Role:

  • Desktop and Server Operating System

Known Issues:

The actions listed in this document are written with the assumption that they will be executed in the order presented here. Some actions may need to be modified if the order is changed. Actions are written so that they may be copied directly from this document into a root shell window with a cut-and-paste operation. The actions listed in this document are written with the assumption that they will be executed by the root user running the /sbin/sh shell and without noclobber set. Before performing the steps of this benchmark, it is strongly recommended that administrators make backup copies of critical configuration files that may get modified by various benchmark items. If this step is not performed, then the site may have no reasonable back-out strategy for reversing system modifications made as a result of this document. The script provided in Appendix A of this document will automatically back up all files that may be modified by the actions, except for the boot scripts manipulated by the various items in Section 3 of this document, which are backed up automatically by the individual items in Section 3.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.


Refer to Known Issues.


Proper use of the recommendations requires careful analysis and adaptation to specific user requirements. The recommendations are not in any way intended to be a quick fix for anyone's information security needs. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the products or the recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any product or recommendation. CIS is providing the products and the recommendations as is and as available without representations, warranties or covenants of any kind.

Product Support:

Not provided.

Point of Contact:


Not provided.


Not provided.

Change History:




URL Description


Reference URL Description

NIST checklist record last modified on 05/10/2011