STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216475

CAT III (Low)

The limitpriv zone option must be set to the vendor default or less permissive.

Rule ID

SV-216475r959010_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000366

Discussion

Solaris zones can be assigned privileges generally reserved for the global zone using the "limitpriv" zone option. Any privilege assignments in excess of the vendor defaults may provide the ability for a non-global zone to compromise the global zone.

Check Content

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

List the non-global zones on the system.

# zoneadm list -vi | grep -v global

From the output list of non-global zones found, determine if any are Kernel zones.

# zoneadm list -cv | grep [zonename] | grep solaris-kz

Exclude any Kernel zones found from the list of local zones.

List the configuration for each zone.

# zonecfg -z [zonename] info |grep limitpriv

If the output of this command has a setting for limitpriv and it is not:
limitpriv: default

this is a finding.

Fix Text

This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

The Zone Security profile is required:

Change the "limitpriv" setting to default. 

# pfexec zonecfg -z [zone] set limitpriv=default