STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216280

CAT II (Medium)

The System packages must be up to date with the most recent vendor updates and security fixes.

Rule ID

SV-216280r959010_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

Failure to install security updates can provide openings for attack.

Check Content

The Software Installation Profile is required.

An up-to-date Solaris repository must be accessible to the system. Enter the command:

# pkg publisher

to determine the current repository publisher. If a repository is not accessible, it may need to be locally installed and configured.

Check for Solaris software package updates:

# pfexec pkg update -n

If the command does not report "No updates available for this image," this is a finding.

Fix Text

The Software Installation Profile is required.

An up-to-date Solaris repository must be accessible to the system. Enter the command:

# pkg publisher

to determine the current repository publisher. If a repository is not accessible, it may need to be locally installed and configured.

Update system packages to the current version.

# pfexec pkg update

A reboot may be required for the updates to take effect.