STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216433

CAT II (Medium)

The system must not allow users to configure .forward files.

Rule ID

SV-216433r959010_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

Use of the .forward file poses a security risk in that sensitive data may be inadvertently transferred outside the organization. The .forward file also poses a secondary risk as it can be used to execute commands that may perform unintended actions.

Check Content

The root role is required.

# for dir in \
`logins -ox | awk -F: '($8 == "PS") { print $6 }'`; do
ls -l ${dir}/.forward 2>/dev/null
done

If output is produced, this is a finding.

Fix Text

The root role is required.

Remove any .forward files that are found.

# pfexec rm [filename]