STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 10 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 X86 Security Technical Implementation Guide

V-216218

CAT III (Low)

The system must require authentication before allowing modification of the boot devices or menus. Secure the GRUB Menu (Intel).

Rule ID

SV-216218r959010_rule

STIG

Solaris 11 X86 Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

The flexibility that GRUB provides creates a security risk if its configuration is modified by an unauthorized user. The failsafe menu entry needs to be secured in the same environments that require securing the systems firmware to avoid unauthorized removable media boots.

Check Content

This check applies to X86 systems only.

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

# grep source /rpool/boot/grub/grub.cfg
source $prefix/custom.cfg

If the output does not contain "source $prefix/custom.cfg" on a line of its own, this is a finding.

# grep superusers /rpool/boot/grub/custom.cfg.
# grep password_pbkdf2 /rpool/boot/grub/custom.cfg

If no superuser name and password are defined, this is a finding.

Fix Text

The root role is required.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this action applies.

Update GRUB to use a custom configuration file.

# pfedit /rpool/boot/grub/grub.cfg
Insert the line:
source $prefix/custom.cfg

Create a password hash.

# /usr/lib/grub2/bios/bin/grub-mkpasswd-pbkdf2
Enter password: 
Reenter password: 
Your PBKDF2 is .......
Copy the long password hash in its entirety.

# pfedit /rpool/boot/grub/custom.cfg
Insert the lines:
set superusers="[username]"
password_pbkdf2 [username] [password hash]

Restart the system.